Home
Categories
EXPLORE
Comedy
Society & Culture
Business
News
Education
Music
Arts
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/1a/f5/ae/1af5aede-48c9-c075-dbe0-23c19fbae16f/mza_9032097501365864647.jpg/600x600bb.jpg
DISCARDED: Tales From the Threat Research Trenches
Proofpoint
93 episodes
3 days ago
Send us fan mail! Hello to all our Cyber Squirrels! Host Selena Larson, and guest host, Tim Kromphardt sit down with Tony Robinson — Senior Security Research Engineer and “rule magician” from Proofpoint’s Emerging Threats team. Tony shares the story behind IoT Hunter, an open-source tool he created to automate writing detection rules for Internet of Things (IoT) vulnerabilities. From routers and smart cameras to industrial control systems, Tony breaks down how IoT Hunter helps researchers and...
Show more...
Technology
RSS
All content for DISCARDED: Tales From the Threat Research Trenches is the property of Proofpoint and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Send us fan mail! Hello to all our Cyber Squirrels! Host Selena Larson, and guest host, Tim Kromphardt sit down with Tony Robinson — Senior Security Research Engineer and “rule magician” from Proofpoint’s Emerging Threats team. Tony shares the story behind IoT Hunter, an open-source tool he created to automate writing detection rules for Internet of Things (IoT) vulnerabilities. From routers and smart cameras to industrial control systems, Tony breaks down how IoT Hunter helps researchers and...
Show more...
Technology
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/1a/f5/ae/1af5aede-48c9-c075-dbe0-23c19fbae16f/mza_9032097501365864647.jpg/600x600bb.jpg
The Art of the Innocent Ask: How Threat Actors Use Benign Conversations
DISCARDED: Tales From the Threat Research Trenches
58 minutes
6 months ago
The Art of the Innocent Ask: How Threat Actors Use Benign Conversations
Hello to all our Cyber Spring Chickens! Join host Selena Larson and guest hosts, Tim Kromphardt and Sarah Sabotka, both Senior Threat Researchers at Proofpoint. These top sleuths crack open Proofpoint’s new Human Factor series and explore one of the most deceptively dangerous tactics in a threat actor’s playbook: the benign conversation. What exactly is a benign conversation—and why is it anything but harmless? Whether it’s a simple “Do you have a minute?” or a seemingly legit job offer...
DISCARDED: Tales From the Threat Research Trenches
Send us fan mail! Hello to all our Cyber Squirrels! Host Selena Larson, and guest host, Tim Kromphardt sit down with Tony Robinson — Senior Security Research Engineer and “rule magician” from Proofpoint’s Emerging Threats team. Tony shares the story behind IoT Hunter, an open-source tool he created to automate writing detection rules for Internet of Things (IoT) vulnerabilities. From routers and smart cameras to industrial control systems, Tony breaks down how IoT Hunter helps researchers and...