Artwork

Innhold levert av preludeorg. Alt podcastinnhold, inkludert episoder, grafikk og podcastbeskrivelser, lastes opp og leveres direkte av preludeorg eller deres podcastplattformpartner. Hvis du tror at noen bruker det opphavsrettsbeskyttede verket ditt uten din tillatelse, kan du følge prosessen skissert her https://no.player.fm/legal.
Player FM - Podcast-app
Gå frakoblet med Player FM -appen!

0verture: The Prelude Podcast CVE-EP16

58:05
 
Del
 

Manage episode 335862938 series 3287215
Innhold levert av preludeorg. Alt podcastinnhold, inkludert episoder, grafikk og podcastbeskrivelser, lastes opp og leveres direkte av preludeorg eller deres podcastplattformpartner. Hvis du tror at noen bruker det opphavsrettsbeskyttede verket ditt uten din tillatelse, kan du følge prosessen skissert her https://no.player.fm/legal.

For this week’s episode of 0verture: The Prelude Podcast Kris and Sam have a further discussion about some of the research Prelude has been conducting by throwing out the question; What is a TTP? We also talk about threat hunting frameworks like MITRE ATT&CK, Diamond, NIST CSF, and Lockheed’s Kill Chain and what they do right and what things are lacking. We also talk about CVEs and CWEs and how those frameworks interact and how threat hunting frameworks should have something similar.
Starting this year, we are going to 2 podcasts a month!

This podcast will be distributed on all major podcasting platforms including Spotify, Apple Podcasts, our blog at feed.prelude.org, and YouTube.

Please subscribe and reach out with any feedback. We love to hear from our community!

There are several ways to follow us and learn more about Prelude and our team members:

Get our products

Download Prelude Operator: https://www.prelude.org/download/current
See the latest kill chain and TTP Releases: https://chains.prelude.org/
See our open-source repositories: https://github.com/preludeorg

Join our community

Discord: https://discord.gg/gzUv4XNquu
Reddit: https://www.reddit.com/r/preludeorg/
Twitter: https://twitter.com/preludeorg

Read, watch, and listen

Listen to our Podcast: https://anchor.fm/preludeorg
Read our blog: https://feed.prelude.org
Watch our live streams: https://www.twitch.tv/preludeorg
Watch our pre-recorded content: https://www.youtube.com/c/preludeorg

Follow our team

David: https://twitter.com/privateducky
Alex: https://twitter.com/khyberspache
Kris: https://twitter.com/Xanthonus
Octavia: https://twitter.com/VV_X_7
Sam: https://twitter.com/wasupwithuman

  continue reading

16 episoder

Artwork
iconDel
 
Manage episode 335862938 series 3287215
Innhold levert av preludeorg. Alt podcastinnhold, inkludert episoder, grafikk og podcastbeskrivelser, lastes opp og leveres direkte av preludeorg eller deres podcastplattformpartner. Hvis du tror at noen bruker det opphavsrettsbeskyttede verket ditt uten din tillatelse, kan du følge prosessen skissert her https://no.player.fm/legal.

For this week’s episode of 0verture: The Prelude Podcast Kris and Sam have a further discussion about some of the research Prelude has been conducting by throwing out the question; What is a TTP? We also talk about threat hunting frameworks like MITRE ATT&CK, Diamond, NIST CSF, and Lockheed’s Kill Chain and what they do right and what things are lacking. We also talk about CVEs and CWEs and how those frameworks interact and how threat hunting frameworks should have something similar.
Starting this year, we are going to 2 podcasts a month!

This podcast will be distributed on all major podcasting platforms including Spotify, Apple Podcasts, our blog at feed.prelude.org, and YouTube.

Please subscribe and reach out with any feedback. We love to hear from our community!

There are several ways to follow us and learn more about Prelude and our team members:

Get our products

Download Prelude Operator: https://www.prelude.org/download/current
See the latest kill chain and TTP Releases: https://chains.prelude.org/
See our open-source repositories: https://github.com/preludeorg

Join our community

Discord: https://discord.gg/gzUv4XNquu
Reddit: https://www.reddit.com/r/preludeorg/
Twitter: https://twitter.com/preludeorg

Read, watch, and listen

Listen to our Podcast: https://anchor.fm/preludeorg
Read our blog: https://feed.prelude.org
Watch our live streams: https://www.twitch.tv/preludeorg
Watch our pre-recorded content: https://www.youtube.com/c/preludeorg

Follow our team

David: https://twitter.com/privateducky
Alex: https://twitter.com/khyberspache
Kris: https://twitter.com/Xanthonus
Octavia: https://twitter.com/VV_X_7
Sam: https://twitter.com/wasupwithuman

  continue reading

16 episoder

Alle episoder

×
 
Loading …

Velkommen til Player FM!

Player FM scanner netter for høykvalitets podcaster som du kan nyte nå. Det er den beste podcastappen og fungerer på Android, iPhone og internett. Registrer deg for å synkronisere abonnement på flere enheter.

 

Hurtigreferanseguide

Copyright 2024 | Sitemap | Personvern | Vilkår for bruk | | opphavsrett