

The Defender's Advantage Podcast
Mandiant
Learn about the latest threat and cybersecurity trends on The Defender’s Advantage Podcast! Hear from experts in the field as Host Luke McNamara, from Google Threat Intelligence Group, interviews analysts, researchers and other guests on the frontlines of the latest attacks. Episodes dive deep into various topics, including nation-state activity, cybercrime, malware and tradecraft, incident response, defensive guidance, and more. Don't forget to subscribe!
Episodes
Mentioned books

Jun 3, 2024 • 30min
Lessons Learned from Responding to Cloud Compromises
Mandiant consultants Will Silverstone and Omar ElAhdan share insights on cloud compromise trends, living off the land techniques, extended attack surfaces, securing identities, third-party risks. They discuss the importance of strong multi-factor authentication, detecting potential attack vectors, and managing third-party risks separately.

May 22, 2024 • 30min
The ORB Networks
Michael Raggi, Principal Analyst at Mandiant Intelligence, discusses ORB networks used by China-nexus threat actors for cyber espionage. Topics include the anatomy of ORB networks, how they are leveraged by APTs like SPACEHOP, and the implications for defenders. The conversation dives into the evolution of tactics, understanding and communication frameworks, and the challenges of attribution in cyber operations.

May 16, 2024 • 28min
Investigations Into Zero-Day Exploitation of the Ivanti Connect Secure Appliances
Mandiant Principal Analysts John Wolfram and Tyler McLellan join host Luke McNamara to discuss their research in the "Cutting Edge" blog series, a series of investigations into zero-day exploitation of Ivanti appliances. John and Tyler discuss the process of analyzing the initial exploitation, and the attribution challenges that emerged following the disclosure and widespread exploitation by a range of threat actors. They also discuss the role a suspected Volt Typhoon cluster played into the follow-on exploitation, and share their thoughts on what else we might see from China-nexus zero-day exploitation of edge infrastructure this year. For more on this research, please check out: Cutting Edge, Part 1: https://cloud.google.com/blog/topics/threat-intelligence/suspected-apt-targets-ivanti-zero-dayCutting Edge, Part 2: https://cloud.google.com/blog/topics/threat-intelligence/investigating-ivanti-zero-day-exploitationCutting Edge, Part 3: https://cloud.google.com/blog/topics/threat-intelligence/investigating-ivanti-exploitation-persistenceCutting Edge, Part 4: https://cloud.google.com/blog/topics/threat-intelligence/ivanti-post-exploitation-lateral-movementFollow John on X at @Big_Bad_W0lf_Follow Tyler on X at @tylabs

Apr 29, 2024 • 26min
M-Trends 2024 with Mandiant Consulting Vice President Jurgen Kutscher
Jurgen Kutscher, Mandiant Vice President for Consulting, joins host Luke McNamara to discuss the findings of the M-Trends 2024 report. Jurgen shares his perspective on the "By the Numbers" data, the theme of evasion of detection in this year's report, and how Mandiant consultants have been leveraging AI in purple and red teaming operations. For more on the M-Trends 2024 report: http://cloud.google.com/security/m-trends

Apr 11, 2024 • 41min
Assessing the State of Multifaceted Extortion Operations
Kimberly Goody leads Mandiant's Cyber Crime Analysis team, specializing in ransomware, while Jeremy Kennelly is a lead analyst with expertise in data theft. They dive deep into the evolution of multifaceted extortion, revealing a sharp rise in ransomware payments, with averages exceeding $1 million. They discuss why manufacturing and small enterprises are increasingly targeted due to limited security and assess the healthcare sector's vulnerabilities. Notably, they highlight shifts in tactics used by attackers, emphasizing a troubling trend in exploit-based operations.

Mar 29, 2024 • 43min
Hunting for "Living off the Land" Activity
Shanmukhanand Naikwade, a cybersecurity consultant, and Dan Nutting, an expert in threat hunting, dive deep into the nuances of 'living off the land' (LotL) cyber attacks. They discuss how attackers exploit legitimate tools to blend in and evade detection, contrasting these tactics with traditional malware. The conversation highlights the significance of adapting detection methods and utilizing threat intelligence effectively. They also shed light on the Volt Typhoon group, exploring its sophisticated tactics and the critical role of logging in cybersecurity.

Mar 14, 2024 • 26min
Director of NSA's Cybersecurity Collaboration Center on Trends in 2024
Morgan Adamski, Director of the NSA's Cybersecurity Collaboration Center (CCC) joins host Luke McNamara to discuss the threat posed by Volt Typhoon and other threat actors utilizing living off the land (LotL) techniques, zero-day exploitation trends, how the CCC works with private sector organizations, and more.

Feb 21, 2024 • 35min
The North Korean IT Workers
Principal Analyst Michael Barnhart joins host Luke McNamara to discuss Mandiant's research into the threat posed by the Democratic People's Republic of Korea's (DPRK) usage of IT workers to gain access to enterprises. For more on Mandiant's analysis of North Korea's cyber capabilities, please see: https://www.mandiant.com/resources/blog/north-korea-cyber-structure-alignment-2023

Feb 7, 2024 • 44min
Prescriptions for a Healthy Cybersecurity Future with Google Cloud's OCISO
Taylor Lehmann (Director, Google Cloud Office of the CISO) and Bill Reid (Security Architect, Google Cloud Office of the CISO) join host Luke McNamara to discuss their takeaways from the last year of threat activity witnessed by enterprises within healthcare and life sciences. They discuss applying threat intelligence to third-party risk management, threat modeling, and more. For more on the work of Google Cloud's Office of the CISO: https://cloud.google.com/solutions/security/board-of-directors?hl=en#additional-thought-leadership-resources

Jan 25, 2024 • 28min
Is The CTI Lifecycle Due For An Update?
Mandiant Intelligence Advisor Renze Jongman joins host Luke McNamara to discuss his blog on the CTI Process Hyperloop and applying threat intelligence to the needs of the security organization and larger enterprise. For more on this topic, please see: https://www.mandiant.com/resources/blog/cti-process-hyperloop


