4.6 • 1K Ratings
🗓️ 21 November 2025
⏱️ 34 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
| 0:00.0 | You're listening to the Cyberwire Network, powered by N2K. |
| 0:09.8 | Welcome to Thrutector, the Palo Alto Networks podcast where we discuss pressing cybersecurity threats and resilience and uncover insights into the latest industry trends. |
| 0:20.9 | I'm your host, David Moulton, Senior Director of Thought Leadership for Unif42. |
| 0:25.5 | Identity compromise means that the attackers are targeting you. |
| 0:31.3 | They're not targeting a machine or a service. |
| 0:34.6 | They're targeting you. |
| 0:35.9 | They're looking to compromise accounts. And in this case of Atlas |
| 0:39.8 | Lion, every new identity that they compromise, they turn that into money. Identity attacks are |
| 0:48.0 | not a future problem. They're a today problem. They're happening now. And we saw in Jinglefeeve |
| 0:53.7 | that one compromised account |
| 0:55.5 | quickly turned into dozens of compromised accounts in a matter of months if you're not monitoring |
| 1:01.7 | behavior. So it really shows the importance of monitoring your identity behavior. And |
| 1:08.3 | the highlight of this attack is that it's entirely in the cloud. |
| 1:12.6 | Attackers don't need exploits. They don't need malware. |
| 1:15.6 | They just need to compromise identities. |
| 1:17.6 | The Today, I'm speaking with Stav Sadi, principal researcher at Palo Alto Networks. |
| 1:39.7 | Stav and the Unif42 research team recently uncovered a financially motivated operation, |
| 1:45.5 | they're calling Jingle Thief, a cloud-based campaign that exploited Microsoft 360 environments |
| 1:51.0 | to commit large-scale gift card fraud targeting global retailers and consumer service enterprises. |
| 1:57.0 | Today we're going to talk about how attackers leverage identity misuse, what this means |
| 2:02.1 | for defenders in Cloud First World, and why campaigns like Jinglefeefe are reshaping how we think |
| 2:07.5 | about trust and persistence in cybersecurity. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.