Defensive Security Podcast Episode 305

Defensive Security Podcast Episode 305

Update: 2025-05-05
Share

Digest

This podcast discusses the key findings of the Mandiant M-Trends report on cybersecurity trends. The report, while acknowledging potential biases due to Mandiant's client base, offers valuable insights into current attack vectors and malware. Surprisingly, vulnerability exploitation surpasses phishing as the most common initial attack vector, emphasizing the critical need for robust patching and secure coding practices. Stolen credentials and web compromises remain significant threats, further highlighting the importance of multi-factor authentication. The report also notes a surprising involvement of North Korean IT workers in some attacks. Regarding malware, the report indicates a decline in new malware families, suggesting a shift towards "living off the land" attacks using existing system tools. However, a concerning rise in Linux malware is observed. The podcast concludes by emphasizing crucial security recommendations: implementing multi-factor authentication (especially phishing-resistant MFA), regular password rotation (particularly for service accounts), improved logging and detection capabilities, and a strong understanding of shared responsibilities in cloud security. The hosts stress the challenges of gaining sufficient visibility into cloud attack surfaces and the importance of secure cloud practices.

Outlines

00:00:00
Introduction and Mandiant M-Trends Report Overview

The episode introduces the Mandiant M-Trends report, acknowledging potential biases while highlighting its value in understanding cybersecurity trends. The hosts also briefly discuss their upcoming vacations and a sponsor message for InVisicle Oak.

00:02:25
Key Findings: Intrusion Vectors

The podcast details the report's findings on intrusion vectors, noting that vulnerability exploitation surpasses phishing as the most common initial attack vector. Stolen credentials and web compromises are also highlighted, along with the surprising involvement of North Korean IT workers.

00:08:44
Key Findings: Malware Trends and North Korean Actors

The discussion shifts to malware trends, including a decline in new malware families and a rise in Linux malware. The surprising involvement of North Korean IT workers in attacks is further discussed.

01:02:12
Security Recommendations and Cloud Security Challenges

The hosts discuss Mandiant's security recommendations, focusing on multi-factor authentication, password rotation, improved logging and detection, and secure cloud practices. They emphasize the importance of understanding shared responsibilities in cloud environments and the challenges of gaining sufficient visibility into cloud attack surfaces.

Keywords

Mandiant M-Trends Report


Annual report analyzing cybersecurity trends based on Mandiant's incident response data; provides insights into attack vectors, malware, and security recommendations.

Vulnerability Exploitation


Attack method leveraging software flaws to gain unauthorized access; requires patching and secure coding practices.

Stolen Credentials


Compromised usernames and passwords; multi-factor authentication is crucial for mitigation.

Multi-Factor Authentication (MFA)


Security measure requiring multiple forms of authentication; crucial for mitigating credential theft.

Linux Malware


Malware targeting Linux systems; a growing threat area.

Cloud Security


Protecting data and systems in cloud environments; requires understanding shared responsibilities.

Phishing


A social engineering attack where malicious actors attempt to trick users into revealing sensitive information.

North Korean Actors


Reference to the involvement of North Korean IT workers in cyberattacks.

Q&A

  • What are the most common initial intrusion vectors identified in the Mandiant M-Trends report?

    Vulnerability exploitation, followed by stolen credentials and phishing.

  • How does the Mandiant report address the issue of malware trends?

    A decline in new malware families and a rise in Linux malware are observed, suggesting a shift towards "living off the land" attacks.

  • What key security recommendations are emphasized in the podcast based on the Mandiant report?

    Multi-factor authentication, password rotation, robust logging and detection, and secure cloud practices, including understanding shared responsibilities.

Show Notes

In this episode, we discuss the Google Mandiant 2025 M-Trends report.  The report is available here: https://services.google.com/fh/files/misc/m-trends-2025-en.pdf


Like what we’re doing and want to help support us? Donate here: https://www.patreon.com/defensivesec

Comments 
00:00
00:00
x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

Defensive Security Podcast Episode 305

Defensive Security Podcast Episode 305

Jerry Bell and Andrew Kalat