Intel471-Logo-white.png
Resources

Intel 471 Podcasts

Webinar-listing-thumbnail.png
Threat Hunting Podcasts//

Email Compromise to Network Threats: Advanced Methodologies in Threat Hunting

Listen Now
Webinar-listing-thumbnail.png
471 Podcasts//

Building Capable Threat Intelligence Programs

It's possible to build effective cyber threat intelligence programs with smaller teams, but stakeholder buy-in is important. John Fokker of Trellix describes how security teams can improve their CTI programs.

Listen Now
471 Podcasts//

Cybercrime Exposed Podcast: Botnet Breakup

The Qakbot or QBot botnet was used by cybercriminal gangs to infiltrate computers, steal their data, conduct financial crime and deploy ransomware. But in 2023, law enforcement hacked the hackers. Here's the story.

Listen Now
Webinar-listing-thumbnail.png
471 Podcasts//

Testing the Efficacy of Security Software

In this edition of Studio 471, Simon Edwards of SE Labs walks through how his company tests security products based on the cyber kill chain and MITRE ATT&CK.

Listen Now
Webinar-listing-thumbnail.png
Threat Hunting Podcasts//

Beyond Detection: Mastering Proactive Threat Hunting Strategies

Listen Now
471 Podcasts//

Cybercrime Exposed Podcast: The Xbox One Hack

In the early 2010s, a group of malicious hackers had a goal: to build a Durango, which was the code name for Microsoft’s next-generation gaming console, eventually known as the Xbox One.

Listen Now
Webinar-listing-thumbnail.png
471 Podcasts//

Vulnerability Management and Patching: Outrunning Attackers

In this edition of Studio 471, Patrick Garrity of Nucleus Security shares the effects of the KEV list across the security industry, his research into the KEV, and how threat intelligence can guide patching efforts.

Listen Now
Webinar-listing-thumbnail.png
Threat Hunting Podcasts//

Navigating Threat Hunting: Community Insights, Effective Tools, and the Role of Honeypots

Listen Now
Cybercrime-Exposed-Ep.-3.png
471 Podcasts//

Cybercrime Exposed Podcast: Social Engineering

In this episode of Cybercrime Exposed, Bluma Janowitz, a social engineer and red team agent, describes two of her engagements to test an organization’s defenses against malicious hackers.

Listen Now
Webinar-listing-thumbnail.png
471 Podcasts//

Mandiant’s CTO: A Bad Year for Ransomware and Extortion

In this edition of Studio 471, Mandiant CTO Charles Carmakal says half of all ransomware or extortion victims are paying ransoms. Sometimes, that is to prevent the release of sensitive data, while others pay to speed up recovery – even if the organizations have backups.

Listen Now
471 Podcasts//

Cybercrime Exposed Podcast: The Extortionists

In one long weekend in May 2023, a cybercriminal gang called Clop conducted one of the largest data breaches on record.

Listen Now
Webinar-listing-thumbnail.png
471 Podcasts//

Should Ransom Payments Be Made Illegal?

In this edition of Studio 471, Megan discusses the future of the Ransomware Task Force, whether ransom payments should be banned and how organizations are strengthening baseline security.

Listen Now

Sign up for our Executive Intel Update

Stay informed with our weekly executive update, sending you the latest news and timely data on the threats, risks, and regulations affecting your organization.