PodcastsTechnologyDISCARDED: Tales From the Threat Research Trenches

DISCARDED: Tales From the Threat Research Trenches

Proofpoint
DISCARDED: Tales From the Threat Research Trenches
Latest episode

98 episodes

  • DISCARDED: Tales From the Threat Research Trenches

    AI as a Tool, Not a Replacement: Malware Research in the Age of LLMs

    26/02/2026 | 50 mins.
    Send us fan mail!

    Hello to all our Cyber Pals! Host Selena Larson and co-host, Sarah Sabotka, chat with Kyle Cucci, and Dr. Chris Wakelin, Threat Researchers from Proofpoint. They unpack how artificial intelligence is shaping modern malware analysis and detection workflows. 
    The conversation explores how large language models are already embedded in day-to-day security operations—from accelerating rule creation and tooling development to helping analysts quickly interpret complex malware behavior.
    Drawing on real-world examples from the team’s work, the episode highlights both the promise and the limitations of AI in cybersecurity. Chris and Kyle share how AI can streamline tedious reverse-engineering tasks, compare malware variants, and surface insights faster—while emphasizing the ongoing need for expert validation, thoughtful prompting, and a human-in-the-loop approach to ensure accuracy and reliability.
    We also discuss:
    Practical ways AI is used today to support malware reverse engineering and detection development

    Prompting strategies that help reduce hallucinations and improve analysis outcomes

    The role of MCP (model context protocol) and emerging agentic AI concepts in security tooling

    Indicators and characteristics of AI-assisted malware development

    Real-world examples of prompt injection attempts within malicious code

    Whether AI-generated malware meaningfully changes defender workflows or primarily increases speed and scale

    How defenders and threat actors alike are leveraging the same AI capabilities across the threat landscape
    Ultimately, this episode offers a balanced look at AI’s growing influence in cybersecurity—showing how intelligent tools can amplify analyst effectiveness while reinforcing that expertise and critical thinking remain central to effective malware defense.
  • DISCARDED: Tales From the Threat Research Trenches

    Snowball Learning: Getting Real About Cybersecurity Training

    10/02/2026 | 42 mins.
    Send us fan mail!
    Hello to all our Cyber Pals! Host Selena Larson and co-host, Sarah Sabotka, chat with Dr. Bob Hausmann, Lead Cognitive Scientist of Human Risk Management at Proofpoint. They have a timely conversation on whether cybersecurity training actually works and what it takes to make it effective.
    They unpack why traditional annual training and phishing simulations often fall short, and how insights from cognitive psychology can help organizations design awareness programs that truly change behavior. Drawing on Dr. Bob’s recent research, the conversation explores just-in-time nudges, microlearning, and how understanding attention, memory, and emotion can make security guidance more actionable in the moments that matter most.
    In this episode, they cover:
    Why once-a-year security training shows little impact on real-world behavior

    How just-in-time nudges work and where they fit into security awareness programs

    The role of cognitive load, attention, and repetition in learning and memory

    How amygdala hijack and emotional manipulation factor into phishing success

    Why foundational knowledge is critical for nudges to be effective

    The difference between education-driven nudges and punitive approaches to training

    Practical ways organizations can design training that fits into everyday workflows

    This episode offers a research-backed, human-centered look at security awareness—showing why better outcomes depend less on blaming users and more on designing training that works with the brain, not against it.

    Resources Mentioned:
    https://www.proofpoint.com/us/blog/security-awareness-training/cybersecurity-nudges-cautionary-tale

    For more information about Proofpoint, check out our website.
     

    Subscribe & Follow:
    Stay ahead of emerging threats, and subscribe! Happy hunting!
  • DISCARDED: Tales From the Threat Research Trenches

    Emerging Threats in 2026: Inside Proofpoint’s Detection Playbook

    29/01/2026 | 45 mins.
    Send us fan mail!

    Hello to all our Cyber Pals! Host Selena Larson and co-host, Tim Kromphardt, chat with Rich Gonzalez, Director of Emerging Threats at Proofpoint, to kick off 2026 with a behind-the-scenes look at how emerging threats are detected, tracked, and turned into real-world protections for defenders.
    They explore what it really takes to keep pace with an always-on threat landscape, from rapid response to newly released proof-of-concepts, to why certain vulnerabilities like Log4j continue to dominate attacker activity years later. The conversation also digs into alert fatigue, the realities of SOC burnout, and where automation and AI can genuinely help versus where trust, accuracy, and human judgment still matter most.
    In this episode, they cover:
    How Proofpoint’s Emerging Threats team monitors global attacker behavior and delivers fast, high-confidence detections
    What happens behind the scenes when a proof-of-concept drops (especially during holidays)
    Why some CVEs remain “evergreen” targets and never truly go away
    The balance between speed and accuracy in rule writing without overwhelming SOC teams
    Where AI and machine learning are being used today to reduce tedious work and improve triage
    The risks of over-automation, hallucinations, and untrusted intelligence in security workflows
    What’s coming in 2026, including more frequent rule releases and more detection coverage

    This episode offers a candid, practitioner-driven view of modern threat detection—highlighting why adaptability, transparency, and human expertise remain essential as defenders head into 2026.
  • DISCARDED: Tales From the Threat Research Trenches

    Operation EndOfYear: New Malware, Popular Tactics, and Where AI Is Taking Us

    31/12/2025 | 56 mins.
    Send us fan mail!
    Hello to all our Cyber Elves! Host Selena Larson chats with Daniel Blackford, Vice President of Threat Research at Proofpoint, for an end-of-year look at how the cyber threat landscape evolved—and what defenders should be preparing for in 2026.
    They reflect on how the second half of 2025 brought meaningful shifts in attacker behavior, with familiar techniques becoming more professionalized and new malware emerging alongside identity-focused attacks. The conversation also explores why attribution is getting harder, how law enforcement disruptions are reshaping cybercrime ecosystems, and where AI is genuinely helping defenders versus introducing new risks.
    In this episode, they cover:
    How attacker tactics “proliferated” in 2025 rather than fully reinvented

    The return of new malware families alongside loaders and backdoors

    Why identity, social engineering, and legitimate tools (RMMs, device code phishing) remain top attack vectors

    The real-world impact of law enforcement takedowns like Operation Endgame

    How shared tooling and services are blurring attribution across threat actors

    Practical, no-hype perspectives on AI, machine learning, and defender workflows

    What organizations should focus on now to stay resilient in 2026

    This episode offers a grounded, experience-driven perspective on what actually mattered in 2025—and why strong fundamentals, layered defenses, and adaptability remain the best preparation for whatever comes next.

    Resources Mentioned:
    https://www.proofpoint.com/us/blog/threat-insight/remote-access-real-cargo-cybercriminals-targeting-trucking-and-logistics
    https://www.proofpoint.com/us/blog/threat-insight/operation-endgame-quakes-rhadamanthys
    https://www.proofpoint.com/us/blog/threat-insight/security-brief-venomrat-defanged
    https://assets.recordedfuture.com/insikt-report-pdfs/2025/cta-ru-2025-1022.pdf
    https://www.microsoft.com/en-us/research/wp-content/uploads/2025/01/lee_2025_ai_critical_thinking_survey.pdf

    For more information about Proofpoint, check out our website.
     

    Subscribe & Follow:
    Stay ahead of emerging threats, and subscribe! Happy hunting!
  • DISCARDED: Tales From the Threat Research Trenches

    Ho-Ho-Hold Up—Is That Message Real? Bad Santas Are Sending Seasonal Scams

    09/12/2025 | 33 mins.
    Send us fan mail!
    Happy Holidays to all our Cyber Pals!
    Host Selena Larson, and co-guest ho-ho-ho hosts, Tim Kromphardt & Sarah Sabotka unwrap the surprising (and sometimes clever) ways cybercriminals use seasonal themes to trick both consumers and enterprises.
    From fake party invites and too-good-to-be-true discounts to holiday-flavored malware and RMM delivery, the team breaks down how threat actors capitalize on increased spending, lower vigilance, and year-end business pressure. They share real examples—like “free Christmas tree” scams, fake travel itineraries, smishing campaigns, and even malware hidden behind a Christmas caroling invitation.
    You’ll also hear:
    🎁 Why holiday-themed lures work so well
    🎁 How scammers tailor their tactics to shifting consumer behavior
     🎁 The rise of SMS scams, malvertising, and SEO-poisoned shopping searches
     🎁 What enterprises should watch for as employees mix work and personal activity
     🎁 Why energy drinks are (shockingly) a hot commodity in cargo theft schemes
     🎁 Practical tips to stay safe—whether you’re holiday shopping or closing year-end invoices
    Before you head off for vacation, join us for a fun, insightful, and very festive breakdown of the seasonal threats that might be landing under your digital tree this year.

    For more information about Proofpoint, check out our website.
    Subscribe & Follow:
    Stay ahead of emerging threats, and subscribe! Happy hunting!

More Technology podcasts

About DISCARDED: Tales From the Threat Research Trenches

DISCARDED: Tales from the Threat Research Trenches is a podcast for security practitioners, intelligence analysts, and threat hunters looking to learn more about the threat behaviors and attack patterns. Each episode you’ll hear real world insights from our researchers about the latest trends in malware, threat actors, TTPs, and more.Welcome to DISCARDED
Podcast website

Listen to DISCARDED: Tales From the Threat Research Trenches, Lex Fridman Podcast and many other podcasts from around the world with the radio.net app

Get the free radio.net app

  • Stations and podcasts to bookmark
  • Stream via Wi-Fi or Bluetooth
  • Supports Carplay & Android Auto
  • Many other app features

DISCARDED: Tales From the Threat Research Trenches: Podcasts in Family

Social
v8.7.0 | © 2007-2026 radio.de GmbH
Generated: 2/28/2026 - 4:46:52 PM