Look for any podcast host, guest or anyone
Showing episodes and shows of

Palo Alto Networks And N2K Networks

Shows

CyberWire DailyCyberWire DailyMuddled Libra: From Spraying to Preying in 2025 [Threat Vector]Please enjoy this Special Edition episode of the Threat Vector podcast with an update on our previous Muddled Libra coverage. Muddled Libra is back and more dangerous than ever. In this episode of Threat Vector, David Moulton speaks with Sam Rubin and Kristopher Russo from Unit 42 about the resurgence of the threat group also known as Scattered Spider. They break down the group’s shift to destructive extortion, modular attack teams, and cloud-first tactics. Discover why traditional defenses fail, how attackers now exploit trusted tools, and what forward-leaning security leaders are doing to stay ah...2025-07-2636 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksMuddled Libra: From Spraying to Preying in 2025Please enjoy this Special Edition episode of the Threat Vector podcast with an update on our previous Muddled Libra coverage. Muddled Libra is back and more dangerous than ever. In this episode of Threat Vector, David Moulton speaks with Sam Rubin and Kristopher Russo from Unit 42 about the resurgence of the threat group also known as Scattered Spider. They break down the group’s shift to destructive extortion, modular attack teams, and cloud-first tactics. Discover why traditional defenses fail, how attackers now exploit trusted tools, and what forward-leaning security leaders are doing to stay ah...2025-07-2636 minResearch SaturdayResearch SaturdayMuddled Libra: From Spraying to Preying in 2025 [Threat Vector]Please enjoy this Special Edition episode of the Threat Vector podcast with an update on our previous Muddled Libra coverage. Muddled Libra is back and more dangerous than ever. In this episode of Threat Vector, David Moulton speaks with Sam Rubin and Kristopher Russo from Unit 42 about the resurgence of the threat group also known as Scattered Spider. They break down the group’s shift to destructive extortion, modular attack teams, and cloud-first tactics. Discover why traditional defenses fail, how attackers now exploit trusted tools, and what forward-leaning security leaders are doing to stay ah...2025-07-2636 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksSmart UX, Safer SystemsJoin David Moulton and Nelson Lee as they explore the vital role of user experience (UX) in cybersecurity. Nelson, drawing from his background at Google and Apple, shares insights on how intuitive design can transform complex security challenges. The discussion highlights the impact of poor UX, using the Arcade platform as a prime example of successful design in incident response. They also delve into how AI and LLMs are set to revolutionize UX, simplifying interactions and enhancing security platforms. Discover how prioritizing UX leads to greater adoption and more effective security solutions. Join the conv...2025-07-2434 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksFrenemies With BenefitsJoin Michael Sikorski and Michael Daniel on Threat Vector for a deep dive into cybersecurity collaboration. They discuss how competing companies and governments can work together. Learn about the Cyber Threat Alliance (CTA) and its role in sharing threat intelligence. The episode explores the challenges of trust and incentives. It covers topics from WannaCry to the impact of AI on defenses. Gain insights into responsible vulnerability disclosure. Understand public-private partnerships. Discover why collaboration is vital for global cybersecurity. This discussion offers key takeaways for security leaders. Links: Palo Alto Network blog archive for...2025-07-1738 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksReach for What You Preach: Bridging UX and CybersecurityIn this episode of Threat Vector, David Moulton talks with Dimitry Shvartsman, Co-Founder and Chief Product Officer of Prime Security, about transforming security into a proactive business enabler. Drawing on decades of experience, Dimitry explains why integrating security at the design stage—not after deployment—is key to reducing risk and improving outcomes. The conversation highlights the challenges of scaling secure development and the role of automation in modern application security. If you're interested in aligning product, design, and security teams to build more resilient software, this episode delivers clear insight and practical advice. Join t...2025-07-1033 minCyberWire DailyCyberWire DailySecure Your Summer: Top Cyber Myths, Busted [Threat Vector]While the N2K CyberWire team is observing Independence Day in the US, we thought you'd enjoy this episode of Threat Vector from our podcast network. Listen in and bust those cyber myths. In this episode of Threat Vector, David Moulton talks with Lisa Plaggemier, Executive Director of the National Cybersecurity Alliance. Lisa shares insights from this year’s “Oh Behave!” report and dives into why cybersecurity habits remain unchanged—even when we know better. From password reuse to misunderstood AI risks, Lisa explains how emotion, storytelling, and system design all play a role in prote...2025-07-0438 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksHunting Threats in Developer EnvironmentsCyber attackers are increasingly targeting the very tools developers trust—integrated development environments (IDEs), low-code platforms, and public code repositories. In this episode of Threat Vector, host David Moulton speaks with Daniel Frank and Tom Fakterman from Palo Alto Networks' threat research team. They uncover how nation-state actors and cybercriminals are using trusted development tools like Visual Studio Code to run malware, exfiltrate data, and stay undetected. Listeners will learn about real-world APT campaigns, why dev tools are high-value targets, and how organizations can secure their software supply chain without slowing down developers. Join the...2025-07-0325 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksThe 90,000 Credential Wake-Up CallIn this episode of Threat Vector, host David Moulton is joined by ⁠Nathaniel Quist⁠, Manager of Cloud Threat Intelligence at Palo Alto Networks’ Cortex. Together, they break down a large-scale cloud extortion campaign that exposed over 90,000 credentials across more than 1,100 cloud accounts. Quist shares how a single misconfiguration led to a wide-scale breach, why identity and access management remains a critical weak point, and how automation is changing the speed and style of cloud-native threats. Learn how to build a solid cloud posture, detect threats faster, and stay ahead of evolving extortion tactics. From the show:  Leake...2025-06-2634 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksCut the Noise, Ditch the Nonsense, Earn the TrustIn this episode of Threat Vector, host David Moulton sits down with Tyler Shields, Principal Analyst at ESG, entrepreneur, and cybersecurity marketing expert, to discuss the fine line between thought leadership and echo chambers in the industry. Tyler breaks down what true thought leadership looks like, how marketing can cut through the noise, and why a bathtub analogy might change the way you think about brand awareness. We also analyze the marketing tactics of successful brands like Dollar Shave Club and the Savannah Bananas to see what cybersecurity can learn from their playbook. Finally, we...2025-06-1833 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksSecure Your Summer: Top Cyber Myths, BustedIn this episode of Threat Vector, David Moulton talks with Lisa Plaggemier, Executive Director of the National Cybersecurity Alliance. Lisa shares insights from this year’s “Oh Behave!” report and dives into why cybersecurity habits remain unchanged—even when we know better. From password reuse to misunderstood AI risks, Lisa explains how emotion, storytelling, and system design all play a role in protecting users. Learn why secure-by-design is the future, how storytelling can reshape behavior, and why facts alone won’t change minds. This episode is a must-listen for CISOs, security leaders, and anyone working to reduce human risk at scale.2025-06-1238 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksA Hackers Insights on Your PrivacyIn this episode of Threat Vector, host David Moulton talks with Arjun Bhatnagar, CEO of Cloaked, about why protecting your digital privacy is more urgent than ever. From building better cybersecurity habits to understanding the hidden risks in everyday apps, Arjun shares practical advice that listeners can use immediately. Learn how personal data is collected, how data breaches impact you directly, and why security posture matters in a hyper-connected world. This conversation offers a clear path for protecting your personal information while using today's technology. Stay secure and informed in an AI-driven future. Join t...2025-06-0537 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksCan you supercharge security with a browser?In this episode of Threat Vector, Ofer Ben‑Noon steps in as guest host to interview cybersecurity strategist Kirsten Davies. They explore why browsers now handle 85 percent of work and how that shift makes them the prime attack surface. Learn how phishing and session hijacks exploit low‑friction paths, why Zero Trust and enterprise browsers must work hand in glove, and how AI can spot anomalies before data is lost. Tune in for practical guidance on balancing seamless user experience with powerful browser defense. Join the conversation on our social media channels: Website:⁠⁠ ⁠⁠⁠⁠https://www.paloaltonetworks.com/⁠⁠ Threat...2025-06-0339 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksRisk, Resilience and Real Talk with Sam AinscowIn this episode of Threat Vector, host David Moulton speaks with Sam Ainscow, Group Chief Security Officer at Hill & Smith PLC. With over 20 years in cybersecurity, Sam shares his deep insights into cyber resilience, risk assessment, and incident response. He explains why a business must prepare through practical training, testing, and honest post-incident reviews. From tailored security awareness programs to the overlooked risks in open source software, this conversation helps security leaders understand how to build stronger, smarter defenses. Learn how to shift from reactive to proactive strategies that drive long-term resilience. Join the conv...2025-05-2937 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksSecuring AI in the EnterpriseIn this episode of Threat Vector, host David Moulton speaks with Tanya Shastri, SVP of Product Management, and Navneet Singh, VP of Marketing - Network Security, at Palo Alto Networks. They explore what it means to adopt a secure AI by design strategy, giving employees the freedom to innovate with generative AI while maintaining control and reducing risk. From identifying shadow AI in the enterprise to protecting data across AI-powered application lifecycles, Tanya and Navneet share insights on visibility, governance, and continuous monitoring. Learn how leading organizations can safely embrace AI without compromising trust, privacy, or security. 2025-05-2236 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksHow to Scale Responsible AI in the EnterpriseRecorded Live at the Canopy Hotel during the RSAC Conference in San Francisco, David Moulton speaks with Noelle Russell, CEO of the AI Leadership Institute and a leading voice in responsible AI. Drawing from her new book Scaling Responsible AI, Noelle explains why early-stage AI projects must move beyond hype to operational maturity—addressing accuracy, fairness, and security as foundational pillars. Together, they explore how generative AI models introduce new risks, how red teaming helps organizations prepare, and how to embed responsible practices into AI systems. From the Show: OpenAI Preparedness Framework Anthropic Re...2025-05-0835 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksConfronting China’s Expanding Cyber ThreatsIn this episode of Threat Vector, host David Moulton talks with Wendi Whitmore, Chief Security Intelligence Officer at Palo Alto Networks, about the increasing scale of China-linked cyber threats and the vulnerabilities in outdated OT environments.  Wendi shares critical insights on how nation-state threats have evolved, why AI must be part of modern defense strategies, and the importance of real-time intelligence sharing. They also dive into scenario planning as a key to resilience. If you want to know how cybersecurity leaders are preparing for the next wave of threats, this episode is a must-listen. From t...2025-05-0122 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksPrivacy and Data Protection in the Age of Big DataIn this episode of Threat Vector, host David Moulton speaks with Daniel B. Rosenzweig, a leading data privacy and AI attorney, about the growing complexity of privacy compliance in the era of big data and artificial intelligence. Dan explains how businesses can build trust by aligning technical operations with legal obligations—what he calls “say what you do, do what you say.” They explore U.S. state privacy laws, global data transfer regulations, AI compliance, and the role of privacy-enhancing technologies.Want more from Daniel? Listen to his previous Threat Vector episode, Beyond...2025-04-2434 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksHow Do Security Teams Keep AI from Becoming a UX Nightmare?AI is transforming cybersecurity at a rapid pace, but how do we ensure security without compromising usability? In this episode of Threat Vector, host David Moulton sits down with Christopher DeBrunner, VP of Security Operations at CBTS, and Ryan Hamrick, Manager of Security Consulting Services. They explore how AI-driven security is improving threat detection, the risks of over-reliance on automation, and the challenges of maintaining data privacy in AI-enabled environments. The conversation dives into the future of AI governance, how organizations can balance security and user experience, and the role of ethical AI use in cybersecurity. Tune in for...2025-04-1737 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksWhat Cybersecurity Blind Spots Could Lead to the Next Major Attack?The cybersecurity industry is full of headlines, but are we paying attention to the right ones? In this episode of Threat Vector, host David Moulton, Director of Thought Leadership at Unit 42, sits down with Rob Wright, Security News Director at Informa TechTarget, to discuss the stories the industry overlooks, the overhyped AI security fears, and the real risks posed by certificate authorities. They discuss the challenges of cybersecurity journalism, the role of deepfakes in modern attacks, and the ongoing issues with transparency in breach disclosures. This conversation sheds light on what security professionals really n...2025-04-1046 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksThe Art of Threat HuntingIn this episode of Threat Vector, host David Moulton, Director of Thought Leadership at Palo Alto Networks, welcomes Ryan Chapman, a seasoned Threat Hunter and digital forensics expert. With over 20 years of experience, Ryan has led incident response teams and authored courses on ransomware, making him a leading voice in the field. The discussion covers the evolving landscape of cybersecurity, with a deep dive into modern threats like LumaStealer and the CUPS vulnerability. Ryan shares actionable insights on how organizations can enhance their defenses by prioritizing threat hunting and staying on top of the latest tactics and vulnerabilities. Tune...2025-04-0325 minCyberWire DailyCyberWire DailyHackers beware, fines are in the air.The UK unveils the full scope of its upcoming Cyber Security and Resilience Bill. Apple warns of critical zero-day vulnerabilities under active exploitation. The InterLock ransomware group claims responsibility for a cyberattack on National Presto Industries. Microsoft flags a critical vulnerability in Canon printer drivers. Check Point Software confirms a data breach. The FTC warns 23andMe’s bankruptcy trustees to uphold their privacy obligations. A Canadian hacker has been arrested and charged for allegedly breaching systems tied to the Texas Republican Party. A GCHQ intern pleads guilty to stealing top-secret data. On our Threat Vector segment, host David Moulton fr...2025-04-0130 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksIs the Quantum Threat Closer Than You Think?Quantum computing is advancing fast, and with it comes a major cybersecurity risk—the potential to break today’s encryption standards. In this episode of Threat Vector, host David Moulton speaks with Richu Channakeshava, Senior Product Manager at Palo Alto Networks, about the urgent need for organizations to prepare for a post-quantum world. They discuss the risks of "harvest now, decrypt later" attacks, the painfully slow process of cryptographic migration, and the steps security leaders must take today to protect sensitive data. If your organization relies on encryption for long-term data security, this episode is a must-listen. Learn why wait...2025-03-2744 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksWhy Security Platformization Is the Future of Cyber ResilienceSecurity platformization is transforming the way organizations defend against cyber threats. In this episode of Threat Vector, host David Moulton speaks with Carlos Rivera, Senior Analyst at Forrester, about how unifying security capabilities strengthens cyber resilience. They discuss the evolving role of enterprise firewalls, the impact of AI-driven security, and how Zero Trust continues to shape modern security strategies. Carlos shares insights from his extensive experience, offering practical advice for organizations navigating these critical changes. Tune in to learn how to make smarter security investments and prepare for the future of cybersecurity.2025-03-2037 minCyberWire DailyCyberWire DailyTrailblazers in Cybersecurity: Lessons from the Women Leading the ChargeWe thought you might enjoy this episode of Threat Vector podcast from the N2K CyberWIre network as we continue our observance of Women's History Month. You can catch new episodes of Threat Vector every Thursday here and on your favorite podcast app. In this special Women’s History Month episode of Threat Vector, host David Moulton speaks with four trailblazing women in cybersecurity who are shaping the industry: Kristy Friedrichs, Chief Partnerships Officer; Tanya Shastri, SVP of Product Management; Sama Manchanda, Consultant at Unit 42; and Stephanie Regan, Principal Technical Architect at Unit 42....2025-03-1630 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksTrailblazers in Cybersecurity: Lessons from the Women Leading the ChargeIn this special Women’s History Month episode of Threat Vector, host David Moulton speaks with four trailblazing women in cybersecurity who are shaping the industry: Kristy Friedrichs, Chief Partnerships Officer; Tanya Shastri, SVP of Product Management; Sama Manchanda, Consultant at Unit 42; and Stephanie Regan, Principal Technical Architect at Unit 42.They share their journeys into cybersecurity, discuss the challenges they faced, and offer insights on leadership, innovation, and mentorship. From AI-driven security to digital forensics, these women have made a lasting impact. Tune in to hear their advice for the next generation and why cy...2025-03-1330 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksThe Glamour and the Glory of OT SecurityThe explosion of connected devices is creating new cybersecurity challenges. In this episode of Threat Vector, host David Moulton, Director of Thought Leadership at Unit 42, sits down with Hollie Hennessy, Principal Analyst for IoT Cybersecurity at Omdia. Hollie shares insights into the evolving risks posed by IoT devices, from industrial control systems to consumer technology. She explains how attackers exploit vulnerabilities in connected environments and the best approaches for risk mitigation. Whether you're a security leader or a technology strategist, this conversation provides a clear roadmap for protecting IoT ecosystems from growing cyber threats.Jo...2025-03-0636 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto Networks10,000 Days in CybersecurityCybersecurity has changed dramatically over the past 10,000 days. In this episode of Threat Vector, host David Moulton speaks with Haider Pasha, Chief Security Officer for EMEA & LATAM at Palo Alto Networks, about how the field has evolved and what’s coming next. From his early experiences with self-replicating code to advising CISOs and CIOs worldwide, Haider shares key insights on AI-driven threats, zero trust strategies, and why platformization is critical for cyber resilience. Learn how attackers are moving faster than ever, what security leaders need to do to keep up, and how businesses can fut...2025-02-2736 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksTransform Your SOC And Get Ahead Of The ThreatsSecurity threats are evolving faster than ever. Organizations must rethink their Security Operations Centers (SOCs) to stay ahead. In this episode of Threat Vector, host David Moulton speaks with Clay Brothers, Senior Director at Unit 42, about the critical need for SOC transformation. They discuss how AI, automation, and proactive risk assessments help businesses build cyber resilience. Clay shares real-world examples of SOC modernization and the impact of AI-driven threat detection. If your SOC is still relying on outdated models, this episode is a must-listen. Learn how to future-proof your security operations and respond to c...2025-02-2036 minCyberWire DailyCyberWire DailyLIVE! From Philly [Threat Vector]While we are taking a publishing break to observe Washington's Birthday here in the United States, enjoy this primer on how to create a podcast from our partners at Palo Alto Networks direct from the CyberMarketingCon 2024.Podcasts have become vital tools for sharing knowledge and insights, particularly in technical fields like cybersecurity. "Threat Vector," led by David Moulton, serves as an essential guide through the complex landscape of cyber threats, offering expert interviews and in-depth analysis.In this session, David will discuss the process behind creating "Threat Vector," highlighting...2025-02-1724 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksUnlocking Cybersecurity ROI with PlatformizationCybersecurity complexity is growing, and organizations are struggling to manage dozens of security tools while keeping up with evolving threats. In this episode of Threat Vector, host David Moulton speaks with Mark Hughes, Global Managing Partner of Cybersecurity Services at IBM, and Karim Temsamani, President of Next Generation Security at Palo Alto Networks, about a groundbreaking study from IBM’s Institute for Business Value. They discuss how security platformization is transforming enterprise security, reducing mean time to detect incidents by 72 days, and driving a 4x ROI on cybersecurity investments. Learn how AI-driven security, automation, and...2025-02-1335 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksLIVE! From PhillyPodcasts have become vital tools for sharing knowledge and insights, particularly in technical fields like cybersecurity. "Threat Vector," led by David Moulton, serves as an essential guide through the complex landscape of cyber threats, offering expert interviews and in-depth analysis.In this session, David will discuss the process behind creating "Threat Vector," highlighting the challenges and rewards of developing a podcast that resonates with industry experts. Attendees will learn about the foundational elements of podcasting, from initial concept development to content creation and audience engagement.David's approach integrates his...2025-02-0924 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksRethinking Cloud Security StrategiesCloud security is more complex than ever. Organizations move fast, but security teams often struggle to keep up. In this episode of Threat Vector, host David Moulton speaks with Amol Mathur, SVP of Products for Prisma Cloud at Palo Alto Networks, about how platformization is reshaping cloud security. Amol shares why security can’t be siloed, how AI is transforming threat detection, and why a proactive, prevention-first approach is essential for securing modern cloud environments. Learn how security leaders can break down operational barriers and implement guardrails—not gates—to empower DevOps teams without sacrifi...2025-02-0635 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksInside DeepSeek’s Security FlawsArtificial intelligence is advancing fast, but with innovation comes risk. In this episode of Threat Vector, host David Moulton sits down with Sam Rubin, SVP of Consulting and Threat Intelligence at Unit 42, and Kyle Wilhoit, Director of Threat Research, to explore the vulnerabilities of DeepSeek, a new large language model. They dive into AI jailbreaking techniques like Bad Likert Judge and Deceptive Delight, uncovering how attackers can manipulate models to generate harmful content. The discussion highlights security risks, data integrity concerns, and why businesses must carefully evaluate AI tools before adopting them. Tune in for expert insights on the...2025-01-3123 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksInside the Mind of State-Sponsored CyberattackersIn this captivating episode of Threat Vector, David Moulton, Director of Thought Leadership for Unit 42, sits down with Lior Rochberger, Principal Threat Researcher at Palo Alto Networks, to uncover the secrets of Operation Diplomatic Specter—a cutting-edge cyber espionage campaign targeting government entities in the Middle East, Africa, and Asia.Lior brings nearly a decade of experience in malware analysis, reverse engineering, and proactive threat hunting to the table. Together, they explore the advanced tactics employed by state-sponsored attackers, including rare, never-before-seen techniques designed to infiltrate and exploit critical networks....2025-01-3027 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksThe ABCs of IOT CybersecurityIoT devices are everywhere, with billions deployed globally in industries like healthcare, manufacturing, and critical infrastructure. But this explosion of connectivity brings unprecedented security challenges. In this episode of Threat Vector, host David Moulton speaks with Dr. May Wang, CTO of IoT Security at Palo Alto Networks, about how AI is transforming IoT security. Dr. Wang shares insights from her pioneering work, including the industry's first AI-based IoT security solution and the evolving nature of threats in the IoT ecosystem. Discover how AI can tackle vulnerabilities, secure 5G-connected devices, and what every organization should know to stay ahead.2025-01-2348 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksCrisis in the Kitchen: Unraveling a Malware IncidentJoin David Moulton, Director of Thought Leadership at Unit 42, as he explores a real-world malware incident that tested BP’s cybersecurity defenses. Featuring Patrick Wright, Forensics and Incident Response Lead, Matthew Ramey, Head of Global Incident Response, and Navid Asgharzadeh, Manager of the CERT team, this episode reveals how the team detected and responded to unexpected threats in a high-stakes environment. Discover the challenges of handling malware hidden in a kitchen management system, insights into critical cybersecurity practices, and the importance of maintaining vigilance in unseen areas of an enterprise network. Tune in for expert advice and firsthand lessons th...2025-01-1626 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksDangers of Cloud MisconfigurationsIn this episode of Threat Vector, host David Moulton speaks with Margaret Kelley, a seasoned Digital Forensics and Incident Response Senior Consultant at Palo Alto Networks’ Unit 42. With a deep expertise in cloud security, Margaret shares insights into the evolving landscape of cloud breaches and how organizations can defend against sophisticated attacks. From misconfigurations to control plane vulnerabilities, the discussion covers the most critical aspects of securing cloud environments. Margaret's real-world examples provide listeners with valuable lessons on how attackers exploit cloud vulnerabilities and what defenders can do to stay ahead. Tune in to learn practical strategies for fortifying yo...2025-01-0937 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksMastering the Basics: Cyber Hygiene and Risk ManagementIn this episode of Threat Vector, host David Moulton, Director of Thought Leadership at Unit 42, sits down with Dr. Daniel Ford, Chief Information Security Officer of Jovia Financial Credit Union. With over 25 years in cybersecurity, Dr. Ford shares his expertise on the evolving practice of cyber hygiene and its impact on managing risk and protecting data in today’s digital environment. They discuss key strategies for improving cybersecurity resilience, from multi-factor authentication and vulnerability management to fostering cyber literacy. Listeners will gain actionable insights into building a robust cyber hygiene strategy and understand why risk management is more than ju...2025-01-0231 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksHow Cybercriminals Leverage Disruption for Maximum Impact [Encore]In this episode of Threat Vector, David Moulton, Director of Thought Leadership at Unit 42, sits down with Wendi Whitmore, Senior Vice President of Unit 42, to discuss the increasing speed and sophistication of cyber attacks. Wendi shares her extensive expertise, highlighting the evolving threat landscape, where cybercriminals focus on disrupting businesses and leveraging end-consumer pressure to extract higher ransoms. The conversation covers critical topics such as AI-driven attacks, ransomware trends, and the growing role of operational resilience. Wendi offers practical advice for organizations to adapt their defenses and reduce downtime, safeguarding their operations. This episode is packed with insights that...2024-12-2625 minCyberWire DailyCyberWire DailyDecoding XDR: Allie Mellen on What’s Next [Threat Vector] While we are on our winter publishing break, please enjoy an episode of our N2K CyberWire network show, Threat Vector by Palo Alto Networks. See you in 2025! Announcement: We are pleased to share an exciting announcement about Cortex XDR at the top of our show. You can learn more here. Check out our episode on "Cyber Espionage and Financial Crime: North Korea’s Double Threat" with Assaf Dahan, Director of Threat Research at Palo Alto Networks Cortex team.Join host David Moulton on Threat Vector, as he dives de...2024-12-2439 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksWhy Big Data Will Rule Cybersecurity in 2025In this episode of Threat Vector, David Moulton, Director of Thought Leadership at Unit 42, talks with Nir Zuk, Founder and CTO of Palo Alto Networks. They talk about Palo Alto Networks' predictions for 2025, focusing on the shift to unified data security platforms and the growing importance of AI in cybersecurity. Nir sheds light on how having more data leads to smarter threat analysis and why big players have the edge over startups. They also discuss quantum computing and whether its potential to break encryption is realistic or overhyped. This conversation offers practical advice for d...2024-12-1933 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksDecoding XDR: Allie Mellen on What’s NextAnnouncement: We are pleased to share an exciting announcement about Cortex XDR at the top of our show. You can learn more here. Check out our episode on "Cyber Espionage and Financial Crime: North Korea’s Double Threat" with Assaf Dahan, Director of Threat Research at Palo Alto Networks Cortex team.Join host David Moulton on Threat Vector, as he dives deep into the rapidly evolving XDR landscape with Allie Mellen, Principal Analyst at Forrester. With expertise in security operations, nation-state threats, and the application of AI in security, Allie offers an inside look at...2024-12-1239 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksBehind the Scenes with Palo Alto Networks CIO and CISO Securing Business Success with Frictionless CybersecurityIn this episode of Threat Vector, David Moulton speaks with Meerah Rajavel, CIO of Palo Alto Networks, and Niall Browne, CISO of the organization, about the importance of aligning IT strategy with cybersecurity. Meerah and Niall discuss how frictionless security, AI integration, and cloud solutions enable agility without compromising safety. They explore how the partnership between IT and security drives business outcomes, enhances customer trust, and ensures rapid incident response. Tune in to learn practical strategies for balancing innovation and security in today’s dynamic business environment.Join the con...2024-12-0539 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksEncore Episode: Insights on Protecting OT from Growing Cyber ThreatsJoin host David Moulton, Director of Thought Leadership at Unit 42, as he revisits key insights from October’s Threat Vector podcast series focused on operational technology (OT) security. This special episode compiles expert discussions from industry leaders, including guest speaker Michela Menting, Senior Research Director at ABI Research; Qiang Huang, VP of Product Management; Del Rodillas, Distinguished Product Manager for Industrial Cybersecurity; and guest speaker Brian Wrozek, Principal Analyst, Security & Risk at Forrester. These experts share their perspectives on implementing zero trust in OT environments, enhancing visibility, and balancing security with operational efficiency.2024-11-2816 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksBridging AI and Cybersecurity Gaps with Mileva Security Labs’ Harriet FarlowJoin us in this episode of Threat Vector as guest host Michael Heller shares his conversation with Harriet Farlow, CEO of Mileva Security Labs and a pioneer in AI security research. With a background spanning AI and national cybersecurity, Harriet shares her journey into adversarial machine learning and the critical importance of addressing AI security vulnerabilities. They discuss how AI models are increasingly exposed to cyber-attacks and why organizations must adopt proactive security measures. Tune in to explore the technical and policy challenges of AI risk, key gaps in model security, and how Mileva Security Labs is working to...2024-11-2127 minCyberWire DailyCyberWire DailyBiden vs. Trump: A tale of two cybersecurity strategies.Pundits predict Trump will overhaul U.S. cybersecurity policy. Experts examine escalating cybersecurity threats facing the U.S. energy sector. Palo Alto Networks patches a pair of zero-days. Akira and SafePay ransomware groups claim dozens of new victims. A major pharmacy group is pressured to pay a $1.3 million ransomware installment. Threat actors are exploiting Spotify playlists and podcasts. An alleged Phobos ransomware admin has been extradited to the U.S. Rapper “Razzlekhan” gets 18 months in prison for her part in the Bitfinex cryptocurrency hack. On today’s Threat Vector, David Moulton speaks with Assaf Dahan, Director of Threat Research at Pal...2024-11-1934 minCyberWire DailyCyberWire DailyOne tap, total access: Pegasus exploits unveiled.Unredacted court filings from WhatsApp’s 2019 lawsuit against NSO Group reveal the scope of spyware infections. Glove Stealer can bypass App-Bound Encryption in Chromium-based browsers. Researchers uncover a new zero-day vulnerability in Fortinet’s FortiManager. Rapid7 detects an updated version of LodaRAT. CISA warns of active exploitation of Palo Alto Networks’ Expedition tool. Misconfigured Microsoft Power Pages accounts expose sensitive data. Iranian state hackers mimic North Koreans in fake job scams. Australia warns its critical infrastructure providers about state sponsored embedded malware. An especially cruel cybercriminal gets ten years in the slammer. Guest Ambuj Kumar, Co-founder and CEO of Simbia...2024-11-1542 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksCyber Espionage and Financial Crime: North Korea’s Double ThreatIn this episode of Threat Vector, host David Moulton speaks with Assaf Dahan, Director of Threat Research at Palo Alto Networks’ Cortex team, about the rising cyber threat from North Korea. Dahan, a cybersecurity expert with over 18 years of experience, discusses the nation's strategic shift towards cybercrime for financial gain, highlighting the scale and sophistication of their operations. Together, they examine the evolution of North Korea’s hacking capabilities—from high-profile attacks like the 2014 Sony hack to current, more calculated cyber operations, including crypto heists and malware targeting global financial institutions.Dahan breaks down how No...2024-11-1433 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksWar Room Best PracticesIn this episode of Threat Vector, David Moulton, Director of Thought Leadership at Unit 42, is joined by cybersecurity experts Kyle Wilhoit, Director of Threat Research, and Michal Goldstein, Director of Security Architecture and Research at Palo Alto Networks. Together, they explore the critical role of war rooms in responding to major security incidents. The conversation delves into best practices for real-time threat intelligence collection, the evolving threat landscape, and how automation can streamline incident response. This episode is essential listening for anyone looking to enhance their organization's resilience against emerging cyber threats. Tune in to learn how to master...2024-11-0735 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksLeadership during a CrisisIn this insightful episode of Threat Vector, host David Moulton sits down with Christopher Scott, Managing Partner at Unit 42 by Palo Alto Networks, to explore the essentials of crisis leadership and management in cybersecurity. With over two decades of experience, Chris shares his journey from IT to crisis management and lessons learned from high-profile incidents like Shamoon and NotPetya. Together, they dive into the critical skills needed during a crisis—swift decision-making, stabilization, and maximizing organizational expertise.Chris emphasizes a shift in crisis response, moving from a top-down to a more collaborative approach that em...2024-10-3135 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksHow Cybercriminals Leverage Disruption for Maximum ImpactIn this episode of Threat Vector, David Moulton, Director of Thought Leadership at Unit 42, sits down with Wendi Whitmore, Senior Vice President of Unit 42, to discuss the increasing speed and sophistication of cyber attacks. Wendi shares her extensive expertise, highlighting the evolving threat landscape, where cybercriminals focus on disrupting businesses and leveraging end-consumer pressure to extract higher ransoms. The conversation covers critical topics such as AI-driven attacks, ransomware trends, and the growing role of operational resilience. Wendi offers practical advice for organizations to adapt their defenses and reduce downtime, safeguarding their operations. This episode is packed with insights that...2024-10-2425 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksBalancing Security with Usability in CybersecurityIn this episode of Threat Vector, host David Moulton talks with guest speaker Brian Wrozek, Forrester Principal Analyst in Security & Risk, about the complexities of aligning security strategies across global teams. Brian draws on his extensive experience in cybersecurity, operational technology (OT) risk, and threat intelligence to discuss how organizations can foster a strong security culture that aligns with business objectives. Learn how to leverage regional champions to address cultural differences, prioritize limited budgets for maximum impact, and build collaboration in security teams. Brian also shares insights on creating a balance between security and u...2024-10-1741 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksBridging IT and OT for a Safer FutureIn this episode of Threat Vector, host David Moulton, Director of Thought Leadership at Unit 42, speaks with Del Rodillas, Distinguished Product Manager for OT Security Solutions at Palo Alto Networks. Del shares insights from his extensive experience in the OT security landscape, covering crucial aspects of building a strong OT security framework. The conversation dives into the challenges of bridging IT and OT teams and the importance of continuous monitoring in critical infrastructure. Del emphasizes the need for a risk-based approach, stakeholder alignment, and effective governance to ensure a resilient OT security program. Listeners will gain practical advice on...2024-10-1026 minCyberWire DailyCyberWire DailyKey player unmasked in global ransomware takedown.Western authorities I.D. a key member of Evil Corp. A major U.S. water utility suffers a cyberattack. ODNI warns of influence campaigns targeting presidential and congressional races. A California deepfakes law gets blocked. Europol leads a global effort against human trafficking. Trinity ransomware targets the healthcare industry. Qualcomm patches a critical zero-day in its DSP service. ADT discloses a breach of encrypted employee data. North Korean hackers use stealthy Powershell exploits. On our Threat Vector segment, David Moulton and his guests tackle the pressing challenges of securing Operational Technology (OT) environments.  Machine Learning pioneers win the Nobel P...2024-10-0834 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksThe State of OT SecurityIn this episode of Threat Vector, David Moulton, Director of Thought Leadership at Palo Alto Networks, hosts cybersecurity experts Qiang Huang, VP of Product Management for Cloud Delivered Security Services, and Michela Menting, Senior Research Director in Digital Security at ABI Research. They discuss the pressing challenges of securing Operational Technology (OT) environments, which are increasingly vulnerable to ransomware, nation-state attacks, and remote access breaches due to the digital transformation in industries like manufacturing and energy. Learn how IT and OT convergence is reshaping cybersecurity strategies and what actions organizations must take to safeguard critical infrastructure. Tune in for...2024-10-0336 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksStaying Ahead of Cloud AttacksIn this episode of Threat Vector, host David Moulton, Director of Thought Leadership at Palo Alto Networks, speaks with Nathaniel Quist, Manager of Cloud Threat Intelligence at Cortex & Unit 42. Nathaniel leads a team at the forefront of understanding the evolving cloud threat landscape. This conversation dives deep into recent cloud extortion operations, the rise of ransomware attacks, and the challenges businesses face in securing public cloud environments. Learn about the intricacies of cloud-native threats, how attackers exploit vulnerabilities in AWS, GCP, and Azure, and what organizations can do to enhance their defenses against the m...2024-09-2631 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksSecuring the GenAI Transformation Journey with Accenture's Daniel KendziorIn this episode of Threat Vector, David Moulton, Director of Thought Leadership at Unit 42, sits down with Daniel Kendzior, Global Data & AI Security Practice Lead at Accenture, to explore the seismic shifts in cybersecurity brought about by AI technologies. As organizations navigate the complexities of AI adoption, Daniel shares insights into the rise of ransomware and phishing attacks, the evolving regulatory landscape, and how AI can be leveraged to bolster cybersecurity operations. This conversation delves into practical applications, from automating routine tasks to enhancing threat detection, offering listeners actionable strategies to stay ahead in an increasingly AI-driven world.2024-09-1939 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksFueling the Business with Cyber AI & Automation with Kieran NortonIn this episode of Threat Vector by Palo Alto Networks, host David Moulton, Director of Thought Leadership, interviews Kieran Norton, Principal at Deloitte & Touche LLP and U.S. Cyber and AI Automation Leader. They discuss the evolution from traditional Security Operations Centers (SOC) to AI-native SOCs, addressing the issues of alert fatigue and data volume. Norton explains how AI can automate routine tasks, allowing analysts to focus on more complex issues, enhancing an organization’s security posture, and offers insights into the interplay between AI and human intelligence in cybersecurity. Also covered are the fut...2024-09-1252 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksBuilding Bulletproof SecurityIn this episode of Threat Vector, host David Moulton, Director of Thought Leadership at Unit 42, engages with Chris Tillett, Product Management and R&D expert, to uncover the deep-seated challenges in cybersecurity. The discussion centers around the human factors that make security difficult, the complexities of implementing conditional MFA, and the often overlooked importance of a strong security culture. Chris shares his insights on how organizations can balance the need for robust security with the realities of human behavior and operational demands, providing valuable takeaways for cybersecurity professionals aiming to enhance their security posture.Jo...2024-09-0530 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksFrom Passwords to Proactive Security: Essential Tips for Educators with Mike SpisakIn this episode of Threat Vector, host David Moulton, Director of Thought Leadership at Unit 42, sits down with Mike Spisak, Technical Managing Director, to delve into the pressing cybersecurity challenges faced by educational institutions. The conversation explores proactive security measures, the importance of a solid risk assessment, and the emerging threats targeting schools. Mike shares actionable insights on improving security postures within budget constraints, emphasizing the critical role of education and awareness in building a cyber-aware culture. Listeners will gain a deep understanding of how to safeguard educational environments from evolving threats, making this e...2024-08-2946 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksIdentity Under Siege: Insights with OktaIn this episode of Threat Vector, host David Moulton, Director of Thought Leadership at Unit 42, engages with Jamie Fitz-Gerald, Sr. Director of Product Management at Okta, to delve into the transformative world of identity security. They explore the critical role of identity as the new perimeter in today’s hybrid work environment, emphasizing the importance of multifactor and passwordless authentication. Jamie shares insights into the evolution of identity security, its foundational role in a zero trust strategy, and the emerging trends that are reshaping the cybersecurity landscape. Listeners will gain valuable knowledge on how to fortify their defenses against mo...2024-08-2245 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksFrom Cyber War to Cyber Strategy with Jason Healey hosted by Michael SikorskiIn this episode of Threat Vector, guest host Michael Sikorski, CTO of Unit 42, engages in a thought-provoking conversation with Jason Healey, Senior Research Scholar at Columbia University's School of International and Public Affairs. They unpack the evolution of cybersecurity, reflecting on Jason's experience across the military, the White House, and academia. Together, they explore the historical challenges and advances in cyber conflict, the role of policy in shaping defense strategies, and the importance of collaboration to outmaneuver threat actors. This episode offers valuable insights for cybersecurity professionals and policy-makers, emphasizing the need for innovation, education, and a holistic approach to...2024-08-1530 minCyberWire DailyCyberWire DailyCybersecurity leaders gear up for the ultimate test.Black Hat kicks off with reassurances from global cyber allies. Researchers highlight vulnerabilities in car head units, AWS and 5G basebands. Alleged dark web forum leaders are charged in federal court. Tens of thousands of ICS devices are vulnerable to weak automation protocols. Kimsuky targets universities for espionage. Ransomware claims the life of a calf and its mother. A look at job risk in the face of AI. In our Threat Vector segment, host David Moulton speaks with Nir Zuk, Founder and CTO of Palo Alto Networks, about the future of cybersecurity. An alleged cybercrime rapper sees his Benjamins...2024-08-0833 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksEnhancing Ethical Hacking with AIIn this episode of Threat Vector, David Moulton, Director of Thought Leadership at Unit 42, sits down with Ryan Barger, Director of Offensive Security Services, to explore how AI is revolutionizing offensive security. Ryan delves into the practical applications of AI in tasks such as OSINT analysis, payload development, and evading endpoint detection systems. He also covers the emerging threat of AI-driven worms and the implications of deepfakes in cyber attacks. Through this insightful discussion, listeners will gain a deeper understanding of how AI enhances both the efficiency and effectiveness of ethical hacking, while also posing new challenges for cybersecurity...2024-08-0839 minCyberWire DailyCyberWire DailyRansomware strikes a nerve.The U.S. blood supply is under pressure from a ransomware attack. CrowdStrike shareholders sue the company. There’s a critical vulnerability in Bitdefender’s GravityZone Update Server. BingoMod RAT targets Android users. Hackers use Google Ads to trick users into a fake Google Authenticator app. Western Sydney University confirms a major data breach. Marylands leads the way in gift card scam prevention. NSA is all-in on AI. My guest is David Moulton, host of Palo Alto Networks' podcast Threat Vector. Attention marketers: AI isn’t the buzzword you think it is. Miss an episode? Sign-up for our dai...2024-08-0130 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksThe Future of Cybersecurity with Nir ZukIn this episode of Threat Vector, host David Moulton, Director of Thought Leadership, converses with Nir Zuk, Founder and CTO of Palo Alto Networks, about the future of cybersecurity. They discuss into the pressing challenges organizations face today and the pivotal shift from traditional defense strategies to a mindset that assumes breaches. Nir discusses the role of AI and machine learning in revolutionizing the Security Operations Center (SOC), emphasizing behavioral analysis for threat detection. The episode explores how AI can enhance speed and scalability, the importance of understanding AI decisions, and the balance between h...2024-08-0129 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksVishing Villains and Voter VigilanceIn this episode of Threat Vector, David Moulton, Director of Thought Leadership at Unit 42, engages with Sama Manchanda, a Consultant at Unit 42, to explore the evolving landscape of social engineering attacks, particularly focusing on vishing and smishing. As election season heats up, these threats are becoming more sophisticated, exploiting our reliance on mobile devices and psychological tactics. Sama provides expert insights into the latest trends, the psychological manipulations used in these attacks, and the specific challenges they pose to individuals and the democratic process. Listeners will gain valuable knowledge on how to protect themselves a...2024-07-1832 minCyberWire DailyCyberWire DailyInside the crypto scam empire.A major Pig Butchering marketplace has ties to the Cambodian ruling family. Lulu Hypermarket suffers a data breach. GitLab patches critical flaws. Palo Alto Networks addresses BlastRadius. ViperSoftX malware variants grow ever more stealthy. A New Mexico man gets seven years for SWATting. State and local government employees are increasingly lured in by phishing attacks. Hackers impersonate live chat agents from Etsy and Upwork. The GOP’s official platform looks to roll back AI regulation. On today’s Threat Vector, David Moulton from Palo Alto Networks Unit 42 discusses the evolving threats of AI-generated malware with experts Rem Dudas and Bar M...2024-07-1131 minCyberWire DailyCyberWire DailyDeep dive into the 2024 Incident Response Report with Unit 42's Michael "Siko" Sikorski [Threat Vector]As our team is offline taking an extended break for the July 4th Independence Day holiday in the US, we thought you'd enjoy an episode from one of N2K Network shows, Threat Vector.This episode of Threat Vector outlines a conversation between host David Moulton, Director of Thought Leadership at Palo Alto Networks Unit 42, and Michael "Siko" Sikorski, Unit 42's CTO and VP of Engineering, discussing the Unit 42's 2024 Incident Response Report. They provide insights into key cyber threats and trends, including preferred attack vectors, the escalating use of AI by...2024-07-0542 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksAI-Generated Cyber ThreatsIn this episode of Threat Vector, hosted by David Moulton, Director of Thought Leadership at Unit 42, we delve into the evolving world of AI-generated malware with our expert guests, Rem Dudas, Senior Threat Intelligence Analyst, and Bar Matalon, Threat Intelligence Team Lead. Together, they uncover the groundbreaking research and experiments their team has conducted on the capabilities of generative AI to create sophisticated malware. From exploring the vulnerabilities in AI models to discussing the potential implications for cybersecurity, this episode offers a deep dive into the challenges and opportunities posed by this emerging threat. Listeners will gain invaluable insights...2024-07-0329 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksFrom Cybersecurity to Cancer Care with Jim FooteIn this episode of the Palo Alto Networks podcast 'Threat Vector,' host David Molton speaks with Jim Foote, CEO of First Ascent Biomedical about his transition from Chief Information Security Officer (CISO) to leading a biotech company utilizing AI to personalize cancer treatments. They discuss how Foote's personal experience with his son's cancer diagnosis drove him to apply cybersecurity principles in developing an innovative approach, called Functional Precision Medicine, which tailors cancer treatment to individual patients. The conversation also covers the role of mentorship, the importance of interdisciplinary skills, and the transformative potential of AI in both cybersecurity...2024-06-2031 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksBeyond Compliance: Using Technology to Empower Privacy and Security with Daniel RosenzweigIn this episode of Threat Vector, host David Moulton, Director of Thought Leadership at Unit 42, is joined by Data Privacy Attorney Daniel Rosenzweig. Together, they unravel the complexities of aligning data privacy and cybersecurity laws with technological advancements. Daniel shares his insights on the critical partnership between legal and tech teams, revealing how a deep understanding of both realms can empower businesses to navigate evolving legal frameworks, particularly in light of emerging AI technologies. Listeners will gain valuable perspectives on operationalizing legal requirements and the importance of proactive collaboration across teams for robust protection strategies. Tune in to discover...2024-06-0639 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksGuardians of the Digital Age: How Gregory Jones Shapes Cybersecurity at Xavier UniversityIn this episode of Threat Vector, host David Moulton speaks with Greg Jones, Chief Information Security Officer at Xavier University of Louisiana. Greg brings a wealth of knowledge from his military background and applies a disciplined, adaptive approach to securing one of America's most vibrant educational institutions. They discuss how Greg's cybersecurity strategies, ranging from comprehensive awareness campaigns to dark web monitoring, protect the campus community from emerging threats like phishing, ransomware, and social engineering. Greg shares how he builds a culture of cybersecurity, the importance of proactive and adaptive strategies, and how empowering students and faculty transforms them...2024-05-2333 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksNavigating the AI Frontier: A Security Perspective with Mike SpisakIn this episode of Threat Vector, host David Moulton, Director of Thought Leadership at Unit 42, discusses the challenges and opportunities of AI adoption with guest Mike Spisak, Managing Director of Proactive Security at Unit 42. They emphasize the importance of early security involvement in the AI development lifecycle and the crucial role of inventorying AI usage to tailor protection measures. Mike provides insights on balancing innovation with security, warning against treating security as the 'last gate,' and describes AI as a 'baby tiger,' underscoring how initial enthusiasm can lead to unforeseen risks if not carefully managed. L...2024-05-0938 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksUnderstanding the Midnight Eclipse Activity and CVE 2024-3400In this episode of Threat Vector, host David Moulton and Andy Piazza, Sr. Director of Threat Intelligence at Unit 42, dive into the critical vulnerability CVE-2024-3400 found in PAN-OS software of Palo Alto Networks, emphasizing the importance of immediate patching and mitigation strategies for such vulnerabilities, especially when they affect edge devices like firewalls or VPNs. The discussion covers the discovery, technical details, and exploitation of the vulnerability, highlighting its potential for unauthenticated attackers to execute arbitrary code with root privileges. They discuss the Midnight Eclipse activity related to pre-disclosure exploitation of the vulnerability, the collaborative response with cybersecurity...2024-04-2719 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksDefending against Adversarial AI and Deepfakes with Billy Hewlett and Tony HuynhIn this episode of Threat Vector, David Moulton, Director of Thought Leadership at Unit 42, explores Adversarial AI and Deepfakes as part of the ongoing series “AI’s Impact in Cybersecurity” with two expert guests, Billy Hewlett, Senior Director of AI Research at Palo Alto Networks, and Tony Huynh, a Security Engineer specializing in AI and deepfakes. They unpack the escalating risks posed by adversarial AI in cybersecurity. You’ll learn how organizations can fortify their defenses against AI-driven attacks and the critical role of human vigilance in safeguarding against sophisticated cyber threats. Join the conversatio...2024-04-2528 minCyberWire DailyCyberWire DailyPrivacy, power, and the path forward.Section 702 edges closer to a vote. CISA provides guidance on Sisense and Microsoft breaches. A major conservative think tank reports a breach. Obsolete D-Link devices are under active exploitation, and Palo Alto warns of a zero-day. Raspberry Robin grows more stealthy. A lastpass employee thwarts a deepfake phishing attempt. Are AI models growing more persuasive? Our guest Kevin Magee from Microsoft Canada joins us to talk about cross domain prompt injection and AI. Floppies keep the trains running on time. Remember to leave us a 5-star rating and review in your favorite podcast app.Miss a...2024-04-1230 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksMission-Driven Security: From Marine Corps to Silicon Valley with Donnie HasseltineIn this episode of Threat Vector, host David Moulton, Director of Thought Leadership at Unit 42, welcomes Donnie Hasseltine, VP of Security at Second Front Systems and a former Recon Marine, as they delve into the indispensable role of a military mindset in cybersecurity. Drawing from over two decades in the Marine Corps and a seamless transition into the tech industry, Donnie shares insights into leveraging military discipline and strategic thinking in the rapidly evolving cybersecurity landscape. This conversation not only explores the challenges and opportunities within the startup ecosystem but also highlights the criticality of foundational cybersecurity...2024-04-0439 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksPublic Meets Private: Forging the Future of Cyber Defense Unpacking Congressional Testimony from Sam RubinJoin David Moulton, Director of Thought Leadership at Unit 42, as he hosts Sam Rubin, VP and Global Head of Operations at Unit 42, to discuss Sam's testimony to the US Congress on the multifaceted landscape of ransomware attacks, AI, and automation, the need for more cybersecurity education and more. This episode digs into the sophistication and rapid evolution of cyber threats with insights drawn from real-world case studies, including stark revelations from sectors like healthcare and education. The conversation underscores the need for robust public-private partnerships in fortifying cybersecurity frameworks. Listeners will gain a deeper understanding...2024-03-2124 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksThe SEC's Cybersecurity Law, a New Compliance Era with Jacqueline Wudyka.In this episode of Threat Vector, we dive deep into the new SEC cybersecurity regulations that reshape how public companies handle cyber risks. Legal expert and Unit 42 Consultant Jacqueline Wudyka brings a unique perspective on the challenges of defining 'materiality,' the enforcement hurdles, and the impact on the cybersecurity landscape. Whether you're a cybersecurity professional, legal expert, or just keen on understanding the latest in cyber law, this episode is packed with insights and strategies for navigating this new terrain. Tune in to stay ahead in the world of cybersecurity compliance!If you're interested t...2024-03-0726 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksDeep dive into the 2024 Incident Response Report with Unit 42's Michael "Siko" SikorskiThis episode of Threat Vector outlines a conversation between host David Moulton, Director of Thought Leadership at Palo Alto Networks Unit 42, and Michael "Siko" Sikorski, Unit 42's CTO and VP of Engineering, discussing the Unit 42's 2024 Incident Response Report. They provide insights into key cyber threats and trends including preferred attack vectors, the escalating use of AI by threat actors, software vulnerabilities, the concept of 'living off the land' attacks, and the importance of robust incident response strategies. They also address the rising trend of business disruption, supply chain attacks, and share recommendations for mitigating these cyber threats.2024-02-2242 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksBeyond the Breach: Strategies Against Ivanti VulnerabilitiesIn this episode of Threat Vector, host David Moulton, Director of Thought Leadership at Unit 42, along with guests Sam Rubin, VP, Global Head of Operations, and Ingrid Parker, Senior Manager of the Intel Response Unit, dive deep into the critical vulnerabilities found in Ivanti's Connect Secure and Policy Secure products. They explore the vulnerabilities' potential impact, the urgency of mitigation, and strategies for defense. This discussion sheds light on the tactical and strategic responses necessitated by the current threat landscape, highlighting the collaboration between public directives and private sector response. ...2024-02-0526 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksThe Role of Threat-Hunting in CybersecurityIn this episode of Threat Vector, host David Moulton, Director of Thought Leadership at Unit 42, speaks with Oded Awaskar, an MDR Senior Manager - Threat-Hunting. Oded talks about how he got into threat-hunting, the evolving threat landscape, and the benefits and challenges of implementing a managed threat-hunting program. He also discusses how AI and ML might change the world of security operations and threat-hunting. The conversation ends with a lightning round of questions, where Oded addresses misconceptions related to threat-hunting and managed detection and response (MDR).If you are interested to learn more ab...2024-01-2537 minCyberWire DailyCyberWire DailyUnveiling the Shadow Strike: A zero-day assault on Ivanti VPN users.A zero-day hits Ivanti VPN customers. CISA highlights an active MS Sharepoint Server flaw. Cisco patches a critical vulnerability. Atomic Stealer gets updates. Sensitive school emergency planning documents are exposed online. The FCC reports on risky communications equipment. The White House will introduce new cybersecurity requirements for hospitals. Mandiant explains their X-Twitter hack. Our guest is Palo Alto Networks’ Unit 42’s David Moulton, host of the new Threat Vector podcast. And we are shocked - shocked! - to learn that an online sex for money scheme is a scam. Remember to leave us a 5-star rating and revie...2024-01-1132 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksCybersecurity in the AI Era: Insights from Unit 42's Kyle Wilhoit, Director of Threat ResearchJoin us on the latest episode of Threat Vector to dive into the evolving world of AI in cybersecurity with Kyle Wilhoit, director of threat research at Unit 42. The podcast also touches on the threat research published by Unit 42 regarding the unique characteristics of Medusa ransomware with Unit 42 researchers Doel Santos, principal threat researcher, and Anthony Galiette, senior malware reverse engineer.This thought-provoking discussion, hosted by David Moulton, director of thought leadership at Unit 42, focuses on the current state and future trends of AI in cyberthreats. Discover how AI is reshaping the landscape of...2024-01-1126 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksThe Impact of Mentorship and Training for Cybersecurity Growth with Garrett BoydThis episode features Garrett Boyd, a senior consultant with a background as a Marine and professor, who discusses the importance of internal training and mentorship in cybersecurity. He provides insights into how training prepares professionals for industry challenges and how mentorship fosters professional growth and innovation. Garrett emphasizes the need for a mentorship culture in organizations and the responsibility of both mentors and mentees in this dynamic. The episode highlights the transformative impact of mentorship through personal experiences and concludes with an invitation for listeners to share their stories and a reminder to stay vigilant in the digital world.2024-01-0409 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksDecoding Cyber Adversaries: Unveiling Intent and Behavior in the World of Threat Hunting with Madeline SedgwickIn this episode of Threat Vector, I had an engaging conversation with Madeline Sedgwick about the skills and methods necessary for understanding threat actor intent and behaviors. Madeline, a senior cyber research engineer and threat analyst, shared insights into how analyzing adversary behavior helps anticipate threats and avoid guesswork. We discussed the value of understanding both system dynamics and human behavior in cybersecurity, emphasizing that the same laws of internet physics limit cyber adversaries. Stay tuned to gain valuable insights into the evolving threat-hunting and deterrence landscape. Join the conversation on our social media...2023-12-1506 minCyberWire DailyCyberWire DailyTaking down the storm.Microsoft takes down the Storm-1152 cybercrime operation. “GambleForce” is a newly discovered threat actor.  The SVR exploits a JetBrains TeamCity vulnerability. US Postal Service impersonation. Malicious ads associated with Zoom. An update on the cyberattack against Kyivstar. Apache issues a Struts 2 security advisory. The FCC adopts new data breach rules.  In our latest Threat Vector segment, David Moulton and Palo Alto Networks Madeline Sedgwick discuss the skills and methods necessary for understanding threat actor intent and behaviors. And the State Department's Global Engagement Center is under fire.Remember to leave us a 5-star rating and review in your f...2023-12-1430 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksThreat Intelligence Treasure Hunt with Jonathan HuebnerIn this episode of Threat Vector, host David Moulton and guest John Huebner, an XSIAM Consultant at Palo Alto Networks, delve into the intricacies of managing threat intelligence feeds in cybersecurity. They discuss the challenges organizations face in sifting valuable intelligence from the noise, emphasizing the importance of risk assessments in guiding the selection and tuning of these feeds. John shares strategies for refining signal-to-noise ratios and the risks of neglecting feed updates, underlining the necessity of continuous management and adaptation in threat intelligence. The conversation highlights the dynamic nature of cyber threats and the critical role of proactive...2023-11-3008 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksFrom Bytes to Bait: Navigating Phishing, Smishing, and Vishing with Sama ManchandaJoin host David Moulton and cybersecurity expert Sama Manchanda in this enlightening episode of Threat Vector. Sama, a consultant with Unit 42, shares her unexpected journey into the world of cybersecurity, reflecting on how an elective course transformed her career trajectory. The conversation delves into the dynamic and fast-evolving nature of cybersecurity, underscoring the constant emergence of new threats and trends.Sama provides an in-depth analysis of various social engineering tactics like phishing, vishing, and smishing, illuminating how attackers craft these deceptions to target individuals and organizations. She underscores the importance of detailed reconnaissance and tailored strategies in...2023-11-1608 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksCyber Threats and the Hidden 20%: A Deep Dive into the Attack Surface with Matt KraningHost David Moulton, Director of Thought Leadership for Unit 42 has a revealing conversation with Matt Kraning, CTO of the Cortex Xpanse Team, as they dive into the latest Attack Surface Threat Report. This podcast episode unveils the startling fact that 20% of the cloud changes every month, leaving organizations vulnerable to unforeseen risks. Matt's team has the remarkable ability to scan the entire internet, uncovering weaknesses and vulnerabilities that plague organizations. They shed light on the most worrisome problems facing large organizations in today's digital landscape.Join the conversation on ou...2023-11-0209 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksEmerging SEC Rules with Kate NaunheimDavid Moulton, Director of Thought Leadership for Unit 42, and Kate Naunheim, Cyber Risk Management Director at Unit 42, discuss the new cybersecurity regulations introduced by the US Securities and Exchange Commission (SEC). Want more on this topic? Join the Unit 42 team for a webinar on November 9, 2023, "The Ransomware Landscape: Threats Driving the SEC Rule and Other Regulations."Join the conversation on our social media channels: Website: ⁠⁠⁠⁠https://www.paloaltonetworks.com/ Threat Research: ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠ Facebook: ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠ LinkedIn: ⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠ YouTube: @paloaltonetworks Twitter: ⁠⁠⁠⁠https://twitter...2023-10-2009 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksInside the Mind of an Insider Threat: Unmasking Motivations with Chris TillettDive deep into the elusive world of insider threats with our latest episode of Threat Vector. Join host David Moulton as he engages in a riveting conversation with Chris Tillett, a senior research engineer at Palo Alto Networks. Uncover the hidden motivations behind insider threats, learn about behavioral patterns to identify potential risks, and gain insights into safeguarding your organization's digital assets.Join the conversation on our social media channels: Website: ⁠⁠⁠⁠https://www.paloaltonetworks.com/ Threat Research: ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠ Facebook: ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠ LinkedIn: ⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠ YouTube: @paloaltonetworks Twitter...2023-10-0607 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksFrom Nation States to Cybercriminals: AI's Influence on Attacks with Wendi WhitmoreDavid Moulton from Unit 42 discusses the evolving threat landscape with Wendi Whitmore, SVP of Unit 42. Wendi highlights the increasing scale, sophistication, and speed of cyberattacks, with examples like the recent Clop ransomware incident, and emphasizes that attackers, including nation-state actors and cybercriminals, are leveraging AI, particularly generative AI, to operate faster and more effectively, especially in social engineering tactics.To protect against these threats, businesses must focus on speed of response, automated integration of security tools, and operationalized capabilities and processes. The conversation underscores the importance of staying vigilant and leveraging technology to defend...2023-09-2107 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksMastering IR Sniping A Deliberate Approach to Cybersecurity Investigations with Chris BrewerDiscover a groundbreaking approach to incident response in our latest episode of Threat Vector. Chris Brewer, Director at Unit 42, delves into the world of "IR Sniping" – a deliberate and targeted methodology that accelerates investigation results. Explore the guiding principles, focused questions, and real-world applications that make "IR Sniping" a game-changer in the realm of cybersecurity. Tune in now for expert insights and strategies to enhance your incident response tactics! Watch Chris present on IR Sniping at CactusConhttps://www.youtube.com/live/bPMAusbODK0?feature=share&t=20947...2023-09-0706 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksExposing Muddled Libra's meticulous tactics with Incident Responder Stephanie ReganHost David Moulton as he speaks with Stephanie Regan, a senior consultant at Unit 42. Stephanie, with a background in law enforcement, specializes in compromise assessment and incident response. Discover her insights into combating the Muddled Libra threat group and similar adversaries.Stephanie highlights the crucial role of reconnaissance in investigations and the importance of strong multi-factor authentication (MFA) to counter phishing and social engineering attacks. She delves into techniques like domain typo squatting and shares how domain monitoring can thwart attackers.Learn how Unit 42 assists clients in recovering from attacks, especially those...2023-08-2407 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksExposing Muddled Libra's meticulous tactics with senior researcher Kristopher RussoIn this episode, we plunge into the realm of Muddled Libra, an enigmatic and calculated threat actor group that sets its sights on vital industries like telecommunications, technology, and software automation. Joined by Kristopher Russo, Senior Threat Researcher at Unit 42, we unveil the group's tactics, techniques, and strategies, offering a glimpse into their world of cyber espionage.Kristopher's passion for combatting cybercriminals is evident as he shares insights into his journey, driven by a fascination with technology's dual nature – to empower and to destroy. Dive deep into the tactics that define Muddled Libra, as th...2023-08-1007 minThreat Vector by Palo Alto NetworksThreat Vector by Palo Alto NetworksAI & Cybersecurity with Michael "Siko" SikorskiMichael "Siko" Sikorski, CTO & VP of Engineering for Unit 42, joins Threat Vector host David Moulton to discuss LLMs & AI and the impacts to expect on social engineering, phishing, and more. Join the conversation on our social media channels: Website: ⁠⁠⁠⁠https://www.paloaltonetworks.com/ Threat Research: ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠ Facebook: ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠ LinkedIn: ⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠ YouTube: @paloaltonetworks Twitter: ⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠ About Threat VectorThreat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strat...2023-07-2707 minResearch SaturdayResearch SaturdayAndroid Toast Overlay: Ryan Olson from Palo Alto NetworksAndroid Toast Overlay enables attackers to trick Android users into enabling permissions on infected devices by making them think they are clicking on benign buttons superimposed over the user interface.Ryan Olson is Director of Threat Intelligence at Palo Alto Networks' Unity 42, and he joins us to share their research. Learn more about your ad choices. Visit megaphone.fm/adchoices2017-10-0719 min