

The Defender's Advantage Podcast
Mandiant
Learn about the latest threat and cybersecurity trends on The Defender’s Advantage Podcast! Hear from experts in the field as Host Luke McNamara, from Google Threat Intelligence Group, interviews analysts, researchers and other guests on the frontlines of the latest attacks. Episodes dive deep into various topics, including nation-state activity, cybercrime, malware and tradecraft, incident response, defensive guidance, and more. Don't forget to subscribe!
Episodes
Mentioned books

Mar 23, 2026 • 30min
Using GTI to Hunt Adversaries on the Dark Web
In this episode of the Defenders Advantage Podcast, host Luke McNamara sits down with Google Threat Intelligence experts Jose Nazario and Brandon Wood. They dive into the rollout of new dark web and underground monitoring capabilities, explaining how AI is fundamentally changing the way defenders track adversaries.https://cloud.google.com/blog/products/identity-security/bringing-dark-web-intelligence-into-the-ai-era\

Jan 16, 2026 • 32min
How Android Combats Mobile Scams
Host Luke McNamara is joined by Eugene Liderman, Senior Director in Android's Security and Privacy Group, to discuss the evolving world of mobile-targeting scams. Eugene details some of the unique aspects to mobile scams, regional variations in tactics by scammers, and the steps Android has taken to combat this problem.

Oct 22, 2025 • 26min
UNC5221 and the BRICKSTORM Campaign
Sarah Yoder (Manager, Mandiant Consulting) and Ashley Pearson (Senior Analyst, Advanced Practices on Google Threat Intelligence Group) join host Luke McNamara to discuss UNC5221 and their operations involving BRICKSTORM backdoor. This highly sophisticated, suspected China-nexus cyber-espionage threat group is known for aggressively targeting internet-facing network appliances (like VPNs and firewalls) to establish long-term, stealthy access for espionage.Read our blog post for more: https://cloud.google.com/blog/topics/threat-intelligence/brickstorm-espionage-campaign

17 snips
Sep 15, 2025 • 39min
How vSphere Became a Target for Adversaries
In this discussion, Stuart Carrera, a Senior Consultant at Mandiant with deep expertise in vSphere security, reveals why threat actors are now targeting VMware environments. He highlights how vSphere's unique features, like AD integrations and the absence of effective detection tools, make it appealing for ransomware and espionage. Stuart shares tactics used in attacks, including backdoors and rapid ransomware execution. He also offers practical hardening tips, urging organizations to treat vSphere as a crucial asset to mitigate risks effectively.

5 snips
Aug 18, 2025 • 26min
AI Tools and Sentiment Within the Underground Cyber Crime Community
Michelle Cantos, a Senior Analyst at Google Threat Intelligence Group, dives into the dark world of underground cybercrime. She reveals how deepfake technology is exploited for creation and monetization, shedding light on the complex landscape of illicit AI tools. The podcast discusses how threat actors leverage customized AI models, transforming conventional crime into sophisticated operations. Additionally, Cantos explores customer reviews in these marketplaces, highlighting the duality of satisfaction and deception among cybercriminals.

Jul 28, 2025 • 43min
Protecting the Core: Securing Protection Relays in Modern Substations
Host Luke McNamara is joined by members of Mandiant Consulting's Operational Technology team (Chris Sistrunk, Seemant Bisht, and Anthony Candarini) to discuss their latest blog on securing assets in the energy grid.https://cloud.google.com/blog/topics/threat-intelligence/securing-protection-relays-modern-substations

Jul 15, 2025 • 24min
The Rise of ClickFix
Dima Lenz (Security Engineer, Google Threat Intelligence Group) joins host Luke McNamara to discuss how threat actors have been using ClickFix to socially engineer users. Dima recounts the growth of this technique in 2024, some of the campaigns and actors that have leveraged it, and where it may be headed next.

Jun 4, 2025 • 38min
Vishing in the Wild
Nick Guttilla and Emily Astranova, from Mandiant Consulting's Offensive Security team, join host Luke McNamara for an episode on voice-based phishing, or "vishing." Nick and Emily cover their respective blogs and experiences, diving into how they employ vishing techniques to social engineer organizations--both organically and using AI-powered voice cloning to mimic specific employees--during red team engagements. https://cloud.google.com/blog/topics/threat-intelligence/technical-analysis-vishing-threats?e=48754805https://cloud.google.com/blog/topics/threat-intelligence/ai-powered-voice-spoofing-vishing-attacks?e=48754805.

May 19, 2025 • 17min
Responding to a DPRK ITW Incident
JP Glab (Mandiant Consulting) joins host Luke to discuss responding to activity from North Korean IT workers. He walks through what initially triggered the investigation at this organization, how it progressed in parallel with an HR investigation, and ultimately what was discovered. For more on the DPRK IT workers and trends in incident response, check out Mandiant's 2025 M-Trends report. https://cloud.google.com/blog/topics/threat-intelligence/m-trends-2025

May 5, 2025 • 28min
UNC5221 and The Targeting of Ivanti Connect Secure VPNs
Matt Lin (Senior Incident Response Consultant, Mandiant) and Daniel Spicer (Chief Security Officer, Ivanti) dive into the research and response of UNC5221's campaigns against Ivanti. They cover how this threat actor has evolved from earlier campaigns, the continued focus of edge infrastructure by APT actors, and the shared responsibility of security in mitigating threats like this. https://cloud.google.com/blog/topics/threat-intelligence/china-nexus-exploiting-critical-ivanti-vulnerabilityhttps://cloud.google.com/blog/topics/threat-intelligence/ivanti-connect-secure-vpn-zero-dayhttps://www.ivanti.com/blog/an-update-on-ivantis-ongoing-commitment-to-enhanced-product-securityhttps://www.ivanti.com/resources/secure-by-design/2024https://cloud.google.com/blog/topics/threat-intelligence/2024-zero-day-trends?e=48754805


