Advanced threats are often highly persistent and can rapidly pivot when encountering roadblocks. Keen insights uncover threat actors’ ability to perform deep reconnaissance to understand their targeted environments thoroughly. Learn more today. Credit: valentinrussanov In the second part of our deep dive into Muddled Libra’s tactics, Threat Vector welcomes Stephanie Regan, a senior consultant with Unit 42 with a law enforcement background. Regan and David Moulton, discuss the challenges Muddled Libra and other threat groups pose. Threat actors are often highly persistent and can rapidly pivot when encountering roadblocks. Regan’s insights demonstrate Muddled Libra’s — and other threat actors’ — ability to perform deep reconnaissance and determination to understand their targeted environments thoroughly. Regan emphasizes that training users to recognize common phishing indicators is essential as the conversation shifts into how users can counter phishing and social engineering tactics. Stronger multifactor authentication (MFA) methods and secure VPNs are critical components in defense. To bolster security, Regan recommends hard-to-fake device properties for VPN access, device certificates and registry keys. Regan outlines the importance of speed, detailed incident response playbooks and the necessity of out-of-band communications to recover from attacks. She provides insights into a threat actor’s targeted attack on a business and its recovery. As threats evolve and share resources in the ransomware market, companies must stay ahead by adapting and enhancing their security measures. Threat Vector provides insights that are both enlightening and cautionary. Still, these summaries only scratch the surface of the expert perspectives in the full podcast episodes. CISOs, C-level executives or anyone with a vested interest in safeguarding the digital world can benefit from subscribing to the Unit 42 Threat Vector podcast. Discover firsthand the invaluable knowledge, strategies and real-world stories cybersecurity experts share. Threat Vector is your compass in the world of cybersecurity. Listen to all current segments on Unit 42 YouTube channel and Spotify. Related content brandpost Sponsored by Palo Alto Networks Insights into IR sniping and AI’s changing face of cyberthreats IR sniping and the transformative function of AI make cybersecurity much more effective—it’s time to find out why. By Palo Alto Networks 01 Feb 2024 4 mins Artificial Intelligence Security brandpost Sponsored by Palo Alto Networks What executives should know about SOAR SOAR allows organizations to not only quickly respond to cybersecurity attacks, but also observe, understand, and prevent future incidents, thus improving their overall security posture. By https://www.istockphoto.com/photo/stylish-confident-businesswoman-and-businessman-working-on-a-project-man-holds-gm1173740593-326128117?phrase=it+executives&searchscope=image%2Cfilm 24 Jan 2024 5 mins Data Management brandpost Sponsored by Palo Alto Networks Healthcare cybersecurity: Our hospital’s path to better cyber resilience There are robust strategies cybersecurity leaders can use to support the delivery of secure, high-quality, modern healthcare. By Wendy Roodhooft, Security Officer at AZ Vesalius 24 Jan 2024 6 mins Cyberattacks Security brandpost Sponsored by Palo Alto Networks A new era of cybersecurity with AI: Predictions for 2024 The best is yet to come…join us for a vital discussion on how cybersecurity coupled with AI will change the rules of the game. Hard truth? More and more attacks will utilize AI. By Dr. May Wang, CTO of IoT Security, Palo Alto Networks 24 Jan 2024 12 mins Artificial Intelligence PODCASTS VIDEOS RESOURCES EVENTS SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe