
Risky Business #744 -- Ransomware upstarts jostle in Lockbit's absence
Risky Business
Evolution of Cybersecurity Strategies
Exploration of cybersecurity evolution towards proactive measures and the importance of limiting human intervention, with a focus on pre-delivery detection techniques. Discussion on deception as a security control and the shift in attacker strategies, including the rise of malicious OAuth apps disguising as legitimate ones. Technical insights into monitoring challenges in cybersecurity, emphasizing the need to detect unusual activities and exploit weaknesses in platforms like Microsoft 365 and Intune.
00:00
Transcript
Play full episode
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.