174 Episodes

  1. UNC5221 and the BRICKSTORM Campaign

    Published: 10/22/2025
  2. How vSphere Became a Target for Adversaries

    Published: 9/15/2025
  3. AI Tools and Sentiment Within the Underground Cyber Crime Community

    Published: 8/18/2025
  4. Protecting the Core: Securing Protection Relays in Modern Substations

    Published: 7/28/2025
  5. The Rise of ClickFix

    Published: 7/15/2025
  6. Vishing in the Wild

    Published: 6/4/2025
  7. Responding to a DPRK ITW Incident

    Published: 5/19/2025
  8. UNC5221 and The Targeting of Ivanti Connect Secure VPNs

    Published: 5/5/2025
  9. Windows Remote Desktop Protocol: Remote to Rogue

    Published: 4/14/2025
  10. Cybersecurity Conversations with the C-Suite and Board

    Published: 3/10/2025
  11. What to Watch For in 2025

    Published: 2/28/2025
  12. Signals of Trouble

    Published: 2/19/2025
  13. Agentic AI in Cybersecurity

    Published: 2/5/2025
  14. The Art of Remediation in Incident Response

    Published: 12/2/2024
  15. How to Run an Effective Tabletop Exercise

    Published: 10/18/2024
  16. Using LLMs to Analyze Windows Binaries

    Published: 10/4/2024
  17. How Threat Actors Bypass Multi-Factor Authentication

    Published: 9/26/2024
  18. TAG's Work Tracking Commercial Surveillance Vendors

    Published: 9/4/2024
  19. What Iranian Threat Actors Have Been Up To This Year

    Published: 7/25/2024
  20. Mandiant's Approach to Securely Using AI Solutions

    Published: 6/27/2024

1 / 9

Learn about the latest threat and cybersecurity trends on The Defender’s Advantage Podcast! Hear from experts in the field as Host Luke McNamara, from Google Threat Intelligence Group, interviews analysts, researchers and other guests on the frontlines of the latest attacks. Episodes dive deep into various topics, including nation-state activity, cybercrime, malware and tradecraft, incident response, defensive guidance, and more. Don't forget to subscribe!