Threat Vector by Palo Alto Networks

Palo Alto Networks and N2K Networks
undefined
Jul 26, 2025 • 36min

Muddled Libra: From Spraying to Preying in 2025

Please enjoy this Special Edition episode of the Threat Vector podcast with an update on our previous Muddled Libra coverage. Muddled Libra is back and more dangerous than ever. In this episode of Threat Vector, David Moulton speaks with Sam Rubin and Kristopher Russo from Unit 42 about the resurgence of the threat group also known as Scattered Spider. They break down the group’s shift to destructive extortion, modular attack teams, and cloud-first tactics. Discover why traditional defenses fail, how attackers now exploit trusted tools, and what forward-leaning security leaders are doing to stay ahead. With real-world case studies, strategic advice, and insights from the front lines, this episode helps defenders understand today’s threat landscape and what’s coming next. Join the conversation on our social media channels: Website: ⁠⁠⁠⁠https://www.paloaltonetworks.com/ Threat Research: ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠ Facebook: ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠ LinkedIn: ⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠ YouTube: @paloaltonetworks Twitter: ⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠ About Threat Vector Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization. Palo Alto Networks Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. ⁠http://paloaltonetworks.com
undefined
Jul 24, 2025 • 35min

Smart UX, Safer Systems

Join David Moulton and Nelson Lee as they explore the vital role of user experience (UX) in cybersecurity. Nelson, drawing from his background at Google and Apple, shares insights on how intuitive design can transform complex security challenges. The discussion highlights the impact of poor UX, using the Arcade platform as a prime example of successful design in incident response. They also delve into how AI and LLMs are set to revolutionize UX, simplifying interactions and enhancing security platforms. Discover how prioritizing UX leads to greater adoption and more effective security solutions. Join the conversation on our social media channels: Website:⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠https://www.paloaltonetworks.com/⁠⁠⁠⁠⁠⁠⁠⁠⁠ Threat Research:⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Facebook:⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ LinkedIn:⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ YouTube:⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠@paloaltonetworks⁠⁠⁠⁠⁠⁠⁠⁠⁠ Twitter:⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ About Threat Vector Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization. Palo Alto Networks Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile.⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠http://paloaltonetworks.com⁠
undefined
Jul 17, 2025 • 39min

Frenemies With Benefits

Michael Daniel, President and CEO of the Cyber Threat Alliance, brings over two decades of public sector cybersecurity experience. He and Michael Sikorski explore how competing entities can collaborate in the cybersecurity arena. The discussion highlights the importance of real-time threat intelligence sharing, especially post-WannaCry. They delve into the ethical aspects of vulnerability disclosure and the evolving trust in public-private partnerships. Tune in for valuable insights on overcoming collaboration challenges to improve global cyber defenses.
undefined
Jul 10, 2025 • 34min

Reach for What You Preach: Bridging UX and Cybersecurity

Dimitry Shvartsman, Co-Founder and Chief Product Officer of Prime Security, shares his extensive experience in integrating security into the design phase of product development. He discusses the importance of viewing security as a proactive business enabler rather than a barrier. Humorously, he likens communication challenges in cybersecurity to family dynamics, highlighting the need for open dialogue. Dimitry emphasizes the necessity of aligning security and development teams to improve outcomes and ensure user trust while utilizing automation for enhanced collaboration.
undefined
Jul 3, 2025 • 25min

Hunting Threats in Developer Environments

Cyber attackers are increasingly targeting the very tools developers trust—integrated development environments (IDEs), low-code platforms, and public code repositories. In this episode of Threat Vector, host David Moulton speaks with Daniel Frank and Tom Fakterman from Palo Alto Networks' threat research team. They uncover how nation-state actors and cybercriminals are using trusted development tools like Visual Studio Code to run malware, exfiltrate data, and stay undetected. Listeners will learn about real-world APT campaigns, why dev tools are high-value targets, and how organizations can secure their software supply chain without slowing down developers. Join the conversation on our social media channels: Website:⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠https://www.paloaltonetworks.com/⁠⁠⁠⁠⁠⁠ Threat Research:⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Facebook:⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ LinkedIn:⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ YouTube:⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠@paloaltonetworks⁠⁠⁠⁠⁠⁠ Twitter:⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ About Threat Vector Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization. Palo Alto Networks Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile.⁠⁠⁠⁠⁠⁠ ⁠http://paloaltonetworks.com⁠
undefined
9 snips
Jun 26, 2025 • 34min

The 90,000 Credential Wake-Up Call

Nathaniel Quist, a leader in Cloud Threat Intelligence at Palo Alto Networks, dives into a staggering cloud extortion campaign that revealed over 90,000 credentials. He explains how a minor misconfiguration opened the floodgates and emphasizes the weaknesses in identity management. Automation's dual role as both a boon and a risk in cloud security is discussed, along with the critical need for collaboration between cybersecurity teams and cloud providers. Quist also shares strategies for building a robust cloud posture and enhancing threat detection.
undefined
Jun 18, 2025 • 34min

Cut the Noise, Ditch the Nonsense, Earn the Trust

In this episode of Threat Vector, host David Moulton sits down with Tyler Shields, Principal Analyst at ESG, entrepreneur, and cybersecurity marketing expert, to discuss the fine line between thought leadership and echo chambers in the industry. Tyler breaks down what true thought leadership looks like, how marketing can cut through the noise, and why a bathtub analogy might change the way you think about brand awareness. We also analyze the marketing tactics of successful brands like Dollar Shave Club and the Savannah Bananas to see what cybersecurity can learn from their playbook. Finally, we explore the future of cybersecurity marketing, discussing how companies can stand out, build trust, and create authentic engagement in a competitive landscape. Join us for this insightful discussion on how security professionals can move beyond repetitive narratives and foster real, impactful thought leadership. Join the conversation on our social media channels: Website:⁠⁠⁠⁠ ⁠⁠⁠⁠https://www.paloaltonetworks.com/⁠⁠⁠⁠ Threat Research:⁠⁠⁠⁠ ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠⁠⁠⁠⁠ Facebook:⁠⁠⁠⁠ ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠⁠⁠⁠⁠ LinkedIn:⁠⁠⁠⁠ ⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠⁠⁠⁠⁠ YouTube:⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠@paloaltonetworks⁠⁠⁠⁠ Twitter:⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠⁠⁠⁠⁠ About Threat Vector Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization. Palo Alto Networks Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile.⁠⁠⁠⁠ ⁠http://paloaltonetworks.com⁠
undefined
Jun 12, 2025 • 38min

Secure Your Summer: Top Cyber Myths, Busted

Lisa Plaggemier, Executive Director of the National Cybersecurity Alliance, shares her expertise blending psychology and marketing to inspire change in cybersecurity. She discusses how emotions and storytelling can reshape cybersecurity habits, highlighting alarming trends like password reuse. Lisa also unveils misunderstandings about AI risks in the workplace, calling for better employee training. Emphasizing the need for secure-by-design approaches, she highlights that facts alone won't shift behaviors, urging innovation through relatable narratives.
undefined
9 snips
Jun 5, 2025 • 37min

A Hacker's Insights on Your Privacy

Arjun Bhatnagar, Co-founder and CEO of Cloaked, shares his expertise on protecting personal privacy in a digital world. He discusses why safeguarding your online data is more urgent than ever, especially in a hyper-connected environment. Arjun dives into how digital footprints can lead to identity theft and financial loss, and emphasizes the importance of strong cybersecurity habits. He also provides practical tips for navigating public Wi-Fi safely and managing app permissions, making it clear that understanding personal data is essential for everyone.
undefined
37 snips
Jun 3, 2025 • 40min

Can you supercharge security with a browser?

Kirsten Davies, a cybersecurity strategist, joins guest host Ofer Ben-Noon to dig into the crucial topic of browser security. They discuss how browsers now handle 85% of work, making them key targets for cyber threats. The duo highlights the dangers of phishing and session hijacking, while emphasizing the importance of Zero Trust principles. They also explore how AI can proactively identify security anomalies. Listeners gain practical insights on enhancing cybersecurity without sacrificing user experience.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app