

AMA Answers From the Threat Research Trenches
Dec 13, 2022
Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26
Introduction
00:00 • 2min
SMTP Is the Worst Protocol
01:31 • 2min
Is There a Kyle Davis Band of the Dismantled Podcast?
03:15 • 2min
The Island of Miss Fit Malware
05:02 • 2min
The Most Surprising Landscape Changes This Year
06:37 • 4min
Toad - The Abbreviation of the Technique
10:10 • 2min
Emotet Is a Real Killer
11:41 • 2min
How Do You Cluster Your TA Groups?
13:12 • 2min
Is APT More Formalized Than E-Crime?
15:18 • 2min
The Biggest Mistake You See Repeatedly From Malware Devs
16:52 • 3min
Which Email Based Threat Actor Has the Best Taste in Wine?
19:41 • 2min
Is That Italian or Russian Slang in Your Code?
21:13 • 1min
IstiD to BachBot?
22:36 • 2min
What Would You Do if You Had to Turn to a Life of Eat Crime?
24:17 • 2min
Is It Ethically OK for Politicians to Solicit Donations?
25:52 • 2min
The Proliferation of Pen Testing and Security Tools by Threat Agents?
27:26 • 2min
How Do You Associate Scanning C2 Infrastructure With Different Groups?
29:10 • 4min
What Are Your Thoughts on Kenny Pickett?
32:46 • 2min
Is Latin America a Threat Actor?
34:37 • 2min
Mobile Malware - What's Coming Next?
37:01 • 2min
What's an Actor That You Don't Track?
39:16 • 2min
I'd Love to Track External Red Teams a Little Bit More
41:15 • 2min
Is Kevin Collier the Best Cyber Reporter?
43:19 • 2min
The Audacity of Threat Actors
45:04 • 2min
How Do You Get Your End User to Click Enable Macros?
46:42 • 2min
Developing Software for Saving the World
48:37 • 3min