4.6 ⢠1K Ratings
šļø 17 May 2025
ā±ļø 18 minutes
šļø Recording | iTunes | RSS
š§¾ļø Download transcript
Click on a timestamp to play from that location
0:00.0 | You're listening to the Cyberwire Network, powered by N2K. |
0:10.2 | What's the common denominator in security incidents? |
0:16.4 | Escalations and lateral movement. |
0:18.9 | When a privileged account is compromised, attackers can seize control of |
0:22.9 | critical assets. With bad directory hygiene and years of technical debt, identity attack paths are |
0:29.6 | easy targets for threat actors to exploit, but hard for defenders to detect. This poses risk |
0:35.6 | in active directory, intra- ID, and hybrid configurations. |
0:40.1 | Identity leaders are reducing such risks with attack path management. |
0:44.7 | You can learn how attack path management is connecting identity and security teams |
0:49.1 | while reducing risk with Bloodhound Enterprise, powered by SpectorOps. |
0:54.8 | Head to SpectorOps.io today to learn more. |
0:58.9 | SpectorOps, see your attack paths the way adversaries do. |
1:20.3 | Thank you. They're not using any sort of really advanced techniques. |
1:25.5 | They're using pretty simple stuff, but they're using it in a different way. |
1:30.4 | And by using it this way, they show that they have an understanding of how soft work, |
1:33.4 | which is something that a lot of directors don't. |
1:44.3 | That's Max Gannon, intelligence Manager with CoFence Intelligence. |
1:47.0 | The research we're discussing today is titled, |
1:52.2 | The Rise of Precision Validated Credential Thft, a New Challenge for Defenders. |
2:04.6 | My team has what we call qualitative groups, And when we find some kind of interesting behavior, we tag it with a group. And a lot of times, we'll only see it once or twice. So it's |
2:09.5 | not really worth writing about it just yet. But when we've seen enough of this qualitative group, |
2:14.3 | especially if it suddenly starts to become more common, then we'll really do an in-depth dive on it and start writing about it. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright Ā© Tapesearch 2025.