Risky Business cover image

Risky Business #744 -- Ransomware upstarts jostle in Lockbit's absence

Risky Business

CHAPTER

Evolution of Cybersecurity Strategies

Exploration of cybersecurity evolution towards proactive measures and the importance of limiting human intervention, with a focus on pre-delivery detection techniques. Discussion on deception as a security control and the shift in attacker strategies, including the rise of malicious OAuth apps disguising as legitimate ones. Technical insights into monitoring challenges in cybersecurity, emphasizing the need to detect unusual activities and exploit weaknesses in platforms like Microsoft 365 and Intune.

00:00
Transcript
Play full episode

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner