meta_pixel
Tapesearch Logo
Log in
CyberWire Daily

Deep dive into the 2024 Incident Response Report with Unit 42's Michael "Siko" Sikorski [Threat Vector]

CyberWire Daily

N2K Networks, Inc.

Daily News, Tech News, News, Technology

4.61K Ratings

🗓️ 5 July 2024

⏱️ 44 minutes

🧾️ Download transcript

Summary

As our team is offline taking an extended break for the July 4th Independence Day holiday in the US, we thought you'd enjoy an episode from one of N2K Network shows, Threat Vector. This episode of Threat Vector outlines a conversation between host David Moulton, Director of Thought Leadership at Palo Alto Networks Unit 42, and Michael "Siko" Sikorski, Unit 42's CTO and VP of Engineering, discussing the Unit 42's 2024 Incident Response Report. They provide insights into key cyber threats and trends, including preferred attack vectors, the escalating use of AI by threat actors, software vulnerabilities, the concept of 'living off the land' attacks, and the importance of robust incident response strategies. They also address the rising trend of business disruption supply chain attacks and share recommendations for mitigating these cyber threats. Resources: Read the 2024 Unit 42 Incident Response report. Listen to Beyond the Breach: Strategies Against Ivanti Vulnerabilities. Join the conversation on our social media channels: Website: ⁠⁠⁠⁠https://www.paloaltonetworks.com/unit42⁠⁠⁠⁠ Threat Research: ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠ Facebook: ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠ LinkedIn: ⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠ YouTube: ⁠⁠⁠⁠@PaloAltoNetworksUnit42⁠⁠⁠⁠ Twitter: ⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠ About Threat Vector Unit 42 Threat Vector is the compass in the world of cyberthreats. Hear about Unit 42’s unique threat intelligence insights, new threat actor TTPs, real-world case studies, and learn how the team works together to discover these threats. Unit 42 will equip listeners with the knowledge and insight to proactively prepare and stay ahead in the ever-evolving threat landscape. Palo Alto Networks Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. ⁠http://paloaltonetworks.com⁠ Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript

Click on a timestamp to play from that location

0:00.0

You're listening to the CyberWire Network powered by N2K.

0:07.0

Hey CyberWire Daily listeners, we're excited to be back on the feed.

0:14.0

Today we're bringing you episode 16 of Threat Vector, where I talked to Mike Sicko Sikorsky,

0:19.0

CTO and VP of Engineering at Unifornia,

0:22.0

about the 2024 UNIF42 incident response report, the rapid

0:26.5

changes we're seeing in threat tactics, and the critical role AI is playing in cyber defense.

0:32.0

During Black Hat, we're going to publish an update

0:33.8

to that report, which will include new predictions

0:36.3

and insights from our teams in the field.

0:38.5

As a reminder, there's no email or log in required

0:41.0

to read the report, so check out the show notes for the link.

0:44.0

I'll also be sitting down with Sicko at Black Hat to continue this conversation.

0:48.0

And I'll be talking with Kyle Will Hoyt, Director of Threat Research,

0:52.0

and Mikhail Goldstein, Director of Security

0:54.8

Architecture and Research about the talk that they'll be giving at Black Hat.

0:58.3

I also recommend that you listen to episode 13 where Kyle shares insights into how generative AI

1:04.3

is being leveraged by criminals and threat actors. He debunked some common fears

1:08.5

and highlights the actual impact on the threat landscape. I highly recommend

1:12.4

this episode. If you enjoy our content

1:14.8

subscribe to Threat Vector on Apple Podcast, Spotify or wherever you listen to

1:18.8

podcast. Okay, now on to the episode.

1:32.0

Don't worry, you're not alone. Join industry leaders from Fortune 500 organizations to secure your apps on any cloud with any

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.