Adversary Universe Podcast

CrowdStrike
undefined
Aug 10, 2023 • 23min

Intel-Led Threat Hunting with CrowdStrike Counter Adversary Operations

“Scary and incredible.” “Terrifying.” Adam and Cristian dig into new data from CrowdStrike’s recently formed Counter Adversary Operations Unit. A new report reveals adversaries are growing faster and smarter, with a focus on collecting identities and pilfering cloud environments. In this episode, learn what’s behind the massive 583% year-over-year jump in Kerberoasting attacks and the 147% jump in access broker ads, as well as how to keep up with adversaries with breakout times down to 79 minutes. Learn more: Get your copy of the CrowdStrike 2023 Overwatch Threat Hunting Report: crowdstrike.com/threat-hunting-report 
undefined
Aug 3, 2023 • 21min

Is Microsoft’s Monoculture a National Security Risk?

Multiple U.S. government agencies were recently breached after adversaries exploited vulnerabilities in Microsoft’s Azure Active Directory. With Microsoft vulnerabilities at the heart of some of the worst breaches in recent history, many in the cybersecurity industry are beginning to wonder: Do the dangers of the Microsoft monoculture outweigh the benefits? In this special bonus episode, Adam and Cristian break down this breach and examine the history of breaches exploiting Microsoft technology on their path to answer a pivotal question: Has Microsoft's monoculture become a national security risk? Learn more: Your choice of security provider is critical to reducing cyber risk. Learn why customers trust CrowdStrike over Microsoft to protect their organization: https://www.crowdstrike.com/microsoft-risk/ Join an upcoming hands-on lab to experience why 8 out of 10 times, when an enterprise runs a proof of value test, they choose CrowdStrike: https://experiencethedifferencebetweencsandmsft.splashthat.com/ 
undefined
Jul 27, 2023 • 24min

Cloud is the New Battleground

Most organizations rely on cloud services or infrastructure to power their day-to-day operations — and adversaries know it. In this episode, we’ll explore how threat actors use the cloud to their advantage: how they breach cloud environments, the actions they take once they’re in, and the ways they use the cloud as a tool in their attacks. We’ll also discuss how organizations often unknowingly put their cloud environments at risk and the steps they can take to strengthen their cloud security.   The cloud is the new attack surface. Get an overview of today’s cloud threat landscape and actionable steps to combat cloud adversaries in the on-demand replay of CrowdStrike’s Cloud Threat Summit. Watch now: https://www.crowdstrike.com/events/cloud-threat-summit/
undefined
Jul 13, 2023 • 24min

Who is the Adversary?

Behind every cyberattack, there is an adversary. These adversaries target organizations large and small, across all industries, to steal money, information and more from their victims. Understanding these adversaries can help you protect your business — and we’re here to help. In the first episode of the Adversary Universe Podcast, we introduce you to our expert hosts, Adam Meyers and Cristian Rodriguez, and begin to tell the story of modern adversaries: who they are, how they’re tracked, and why you should learn more about them. Additional resources: Learn more about the podcast: https://www.crowdstrike.com/adversaryuniversepodcast Download your copy of the 2023 Global Threat Report: https://www.crowdstrike.com/global-threat-report/  Get your custom threat landscape: https://www.crowdstrike.com/adversaries Read CrowdStrike's Research and Intel blogs: https://www.crowdstrike.com/blog/category/threat-intel-research/ Meet the adversaries that evade traditional AV: https://www.crowdstrike.com/resources/white-papers/modern-adversaries-and-evasion-techniques-ebook/
undefined
Jun 28, 2023 • 2min

Adversary Universe Podcast Trailer

Welcome to the Adversary Universe podcast, the best place to learn about the threat actors behind today’s cyberattacks. We’ll dig deep into the adversaries we’re tracking here at CrowdStrike, the tactics and techniques they employ, threats we’ve seen in the wild, and most importantly, how all of this information can help you better defend your organization.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app