

The Cybersecurity Defenders Podcast
LimaCharlie
An accessible but technical podcast about cybersecurity and the people who keep the internet safe. The podcast is built as a series of segments: we will be looking back at the last couple of weeks in cybersecurity news, talking to different people in the industry about areas of their expertise, we're going to break apart some of the TTPs being used by adversaries, and we will even cover a little bit of hacker history.
Episodes
Mentioned books

9 snips
Jun 20, 2025 • 31min
#223 - Defender Fridays: Maintaining the human touch in security operations with Hayden Covington, SOC SecOps Lead at BHIS
Hayden Covington, SOC SecOps Lead at Black Hills Information Security, shares insights from his extensive background, including work with APTs for a Navy contractor. He dives into the vital balance of AI and human oversight in security operations, stressing the importance of maintaining a human touch to prevent errors. The conversation highlights how AI can enhance detection and streamline operations, while also discussing the challenges posed by rapidly evolving AI technologies. With an informal tone, they emphasize collaboration in tackling cybersecurity challenges.

Jun 18, 2025 • 27min
#222 - Intel Chat: PurpleHaze, KEV++, ChatGPT & Mirai botnet
Discover the troubling tactics behind China-backed cyberattacks on SentinelOne and the implications for the cybersecurity landscape. Delve into newly exploited vulnerabilities in popular software and the legal responsibilities tied to cybersecurity incidents. Uncover how AI misuses are reshaping phishing and malware scenarios, calling for responsible practices. Finally, gain insight into the active exploitation of a critical flaw in Wazuh Server, allowing attackers to unleash Mirai botnet variants for DDoS operations.

11 snips
Jun 17, 2025 • 33min
#221 - AI and Automation for security operations with Filip Stojkovski, Staff Security Engineer at Snyk
Filip Stojkovski, Staff Security Engineer at Snyk, shares his insights from over 15 years in cybersecurity. He discusses the transformative role of AI and automation in security operations and how these technologies can enhance incident response. Filip highlights Snyk’s approach to code security, emphasizing secure coding practices in modern development pipelines. He also reflects on his career journey, from early interests to shaping security strategies and frameworks, ultimately advocating for a thoughtful integration of AI with necessary human oversight.

15 snips
Jun 13, 2025 • 31min
#220 - Defender Fridays: AI on the edge with David (DWIZZLE) Weston, Corporate Vice President, Enterprise and OS Security at Microsoft
David Weston, Corporate Vice President of Enterprise and OS Security at Microsoft, dives into the cutting-edge intersection of AI and cybersecurity. He discusses the complexities of securing AI within Windows, reflecting on historical lessons like ActiveX. The chat highlights the crucial balance between security and extensibility in AI models, along with transformative innovations in endpoint security, such as ENTRA ID. Weston emphasizes the importance of collaboration in the cybersecurity landscape and invites listeners to actively engage with AI advancements for a safer digital future.

Jun 11, 2025 • 29min
#219 - Intel Chat: MSFT-Crowdstrike, GangExposed, Fastlane & HashiCorp Nomad servers
A strategic alliance between Microsoft and CrowdStrike aims to standardize threat actor naming for clearer communication in cybersecurity. An intriguing figure, GangExposed, emerges, revealing the identities of leaders within notorious ransomware groups. The podcast also discusses a new supply chain attack in the Ruby ecosystem that uses malicious packages to steal data. Additionally, researchers uncover the exploitation of misconfigured HashiCorp Nomad servers for unauthorized cryptocurrency mining, highlighting the critical need for robust security measures.

Jun 3, 2025 • 33min
#218 - Coinbase + Cetus, Hazy Hawk, BadSuccesssor & DCIS takedown
In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community.Two significant crypto security breaches occurred in close succession this month, affecting both decentralized and centralized platforms. On May 22, Cetus—a decentralized exchange built on the Sui Network—was exploited via a vulnerability in its automated market maker (AMM). Meanwhile, Coinbase confirmed what it called a “targeted insider threat operation” that compromised data from less than 1% of its active monthly users.A threat group identified as “Hazy Hawk” has been systematically hijacking cloud-based DNS resources tied to well-known organizations, including the US Centers for Disease Control and Prevention (CDC), since December 2023. A newly disclosed vulnerability in Windows Server 2025, dubbed BadSuccessor, has raised major concerns among enterprise administrators managing Active Directory environments.Federal and international law enforcement, alongside a significant number of private-sector partners, have successfully dismantled the Danabot botnet in a multiyear operation aimed at neutralizing one of the more advanced malware-as-a-service (MaaS) platforms tied to Russian cybercriminal activity.

12 snips
May 27, 2025 • 33min
#217 - Navigating compliance and risk with Joshua Hoffman, CRO at ControlCase
In this discussion, Joshua Hoffman, the Chief Revenue Officer at ControlCase, sheds light on transforming compliance into a strategic advantage. With a rich background in cybersecurity, he emphasizes a shift from basic compliance to dynamic risk management. Joshua explores the role of AI in navigating complex regulatory frameworks like CMMC and PCI DSS. He also evaluates how small businesses can tackle new SEC disclosures, underscoring the importance of partnerships and communication in building a robust cybersecurity strategy.

May 21, 2025 • 35min
#216 - Intel Chat: Scattered Spider, TA406, Oriental Gudgeon & Apple patches
In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community.A report from Google on how to defend against UNC3944, better known as Scattered Spider.North Korea-backed threat actor TA406 has shifted its focus to targeting Ukrainian government agencies, according to new research from Proofpoint.Since October 2024, urlscan.io has been tracking a phishing campaign known as Oriental Gudgeon, which is targeting over 40 Japanese commercial entities—mostly in the financial services sector.Apple has released a substantial batch of security updates across its software ecosystem, including iOS 18.5, iPadOS, and the latest versions of macOS. And the article Matt mentions about CISA shifting their alert distribution strategy: https://www.infosecurity-magazine.com/news/cisa-alert-strategy-email-social/

May 15, 2025 • 31min
#215 - Inside cyber warfare, intelligence, and investment with Hank Thomas, Managing Partner and Founder at Strategic Cyber Ventures
On episode 215 of the Cybersecurity Defenders Podcast, Hank Thomas, Managing Partner and Founder at Strategic Cyber Ventures, shares his journey from Army intelligence officer to cyber-focused venture capitalist. But the most pressing part of the conversation is his call for a structural overhaul in how the US military handles cyber operations.Thomas argues that cyber is no longer a niche; it is the starting point for modern conflict. Yet cyber capability remains fragmented across service branches, leading to inefficiencies, talent drain, and even internal competition for resources. He makes the case for a separate, fully resourced cyber force, similar to the creation of the Air Force and Space Force, to truly secure the digital domain.He also shares concerns about government overreliance on contractors in critical cyber roles, the need for agile decision-making authority during cyber operations, and why AI must be deployed responsibly to defend a fractured critical infrastructure landscape.

May 14, 2025 • 32min
#214 - Intel Chat: UTA0352/UTA0355, Commvault, Sonic wall & Bot Traffic
In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community.Since March 2025, Volexity has tracked an escalation in sophisticated phishing campaigns executed by two suspected Russian threat actors, UTA0352 and UTA0355, targeting the Microsoft 365 accounts of individuals connected to Ukraine and human rights organizations. A recent security assessment by watchTowr uncovered a pre-authenticated Remote Code Execution (RCE) vulnerability in Commvault’s on-premise Backup and Recovery solution (Innovation Release 11.38.20). CISA has added two SonicWall vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, indicating an escalation in exploitation activity against the vendor’s SMA series of secure remote access appliances. Bot traffic has overtaken legitimate human use on the internet, with the latest data showing that automated traffic now accounts for 51% of all internet activity—of which 37% is classified as malicious.


