Hacked cover image

Hacked

The Red Teamer

Feb 21, 2025
Dive into the world of red teaming with an expert who reveals how cyber threats have evolved. Discover how attackers are now logging in rather than breaking in, showcasing identity as the new frontier. Hear about the sophisticated phishing tactics that can outsmart multi-factor authentication. The conversation touches on the vulnerabilities tied to remote work and the critical need for effective identity management. Plus, enjoy anecdotes that blend humor with serious insights on cybersecurity compliance and the modern digital landscape.
01:05:13

Podcast summary created with Snipd AI

Quick takeaways

  • The evolution of cyber threats has shifted focus from network vulnerabilities to identity systems, emphasizing the need for robust user credential protection.
  • Red teaming exposes organizations to simulated cyber attacks, revealing how swiftly security gaps can be exploited under real-world conditions.

Deep dives

The Role of Red Teamers

Ethical hackers, or red teamers, simulate sophisticated cyber attacks to help organizations identify and fix vulnerabilities in their security systems. Adam shares his experience from working in this capacity, where he was contracted to infiltrate companies and demonstrate what an actual threat actor could accomplish. This often involved conducting simulated attacks mimicking state-sponsored adversaries, where his team's success was sometimes achieved within days, far shorter than the contracted timeline. Such operations illustrate how security weaknesses can exist and be exploited much faster than organizations anticipate.

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner
Get the app