{"id":53,"date":"2023-12-19T00:00:00","date_gmt":"2023-12-19T00:00:00","guid":{"rendered":"http:\/\/localhost\/wordpress\/?p=53"},"modified":"2025-05-12T23:33:47","modified_gmt":"2025-05-13T06:33:47","slug":"unit42-threat-vector-podcas-provides-insights-into-threat-intelligence-landscape","status":"publish","type":"post","link":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/unit42-threat-vector-podcas-provides-insights-into-threat-intelligence-landscape\/","title":{"rendered":"Unit 42 Threat Vector Podcast Provides Insights into Threat Intelligence Landscape"},"content":{"rendered":"<p>Today\u2019s complex threat landscape demands that, in addition to having a team of cybersecurity experts, every business leader needs to understand the current risks and how to manage them. Just as business is never static neither is risk management. <\/p>\n<p><a href=\"\/cybersecurity-perspectives\/soc-consolidation\" data-page-track=\"true\" data-page-track-value=\"cybersecurity-perspectives:unit42-threat-vector-podcas-provides-insights-into-threat-intelligence-landscape: parbase:unit 42 threat vector podcast provides insights into threat intelligence landscape\n\">The continual onslaught of information<\/a> can be overwhelming. The knowledge and foresight needed to detect, prevent and mitigate cybersecurity risks are extensive and ever-evolving. Leaders need a comprehensive understanding of cybersecurity and insights that consider more than just data. <\/p>\n<p>The Unit 42<sup>\u00ae<\/sup> Threat Vector podcast deploys comprehensive cybersecurity insights in a medium easily accessible for <a href=\"\/cybersecurity-perspectives\/aligning-priorities\" data-page-track=\"true\" data-page-track-value=\"cybersecurity-perspectives:unit42-threat-vector-podcas-provides-insights-into-threat-intelligence-landscape: parbase:unit 42 threat vector podcast provides insights into threat intelligence landscape\n\">busy leaders on the go<\/a>: a compelling biweekly podcast segment hosted on CyberWire Daily. It provides business leaders invaluable insights from Unit 42\u2019s threat intelligence experts, incident responders and proactive security consultants through engaging discussions, expert interviews and insightful analyses.<\/p>\n<p>Let\u2019s look at some of the highlights of Threat Vector\u2019s first three episodes. You can also subscribe to hear future segments on CyberWire Daily <a href=\"https:\/\/thecyberwire.com\/podcasts\/daily-podcast\" target=\"_blank\" rel=\"noopener\" data-page-track=\"true\" data-page-track-value=\"cybersecurity-perspectives:unit42-threat-vector-podcas-provides-insights-into-threat-intelligence-landscape: parbase:unit 42 threat vector podcast provides insights into threat intelligence landscape\n\">here<\/a>. <\/p>\n<h2>Episode 1: AI\u2019s Impact on Cybersecurity with Michael \u201cSiko\u201d Sikorski<\/h2>\n<p>It\u2019s on everyone\u2019s mind: How will AI benefit threat actors? <\/p>\n<p>In our inaugural episode, Michael \u201cSiko\u201d Sikorski, CTO and VP of Engineering and Threat Intelligence at Unit 42 answers that question and speaks to the <a href=\"\/cybersecurity-perspectives\/chatgpt-article\" data-page-track=\"true\" data-page-track-value=\"cybersecurity-perspectives:unit42-threat-vector-podcas-provides-insights-into-threat-intelligence-landscape: parbase:episode 1: ais impact on cybersecurity with michael \u201csiko\u201d sikorski\">profound influence of artificial intelligence<\/a> in an interview with David Moulton, Director of thought leadership for Unit 42. <\/p>\n<p>What\u2019s Sikorski\u2019s critical concern? The pervasive integration of AI, particularly ChatGPT and large language models (LLMs), into the cybersecurity landscape. Sikorski discusses where attackers benefit from AI and how it will supercharge social engineering attacks. The potential here is staggering, as AI can craft eerily convincing messages in the style of specific individuals, making it a potent tool for phishing attacks and virtually indistinguishable from genuine communication.<\/p>\n<p>As Sikorski aptly puts it, \u201cLowering the bar for social engineering attacks means attackers are less likely to be caught due to language inconsistencies.\u201d The result? An upsurge in <a href=\"\/cybersecurity-perspectives\/stop-getting-phished\" data-page-track=\"true\" data-page-track-value=\"cybersecurity-perspectives:unit42-threat-vector-podcas-provides-insights-into-threat-intelligence-landscape: parbase:episode 1: ais impact on cybersecurity with michael \u201csiko\u201d sikorski\">phishing attacks<\/a>. This shift necessitates heightened vigilance and proactive measures on the part of organizations.<\/p>\n<p>The increasingly widespread use of artificial intelligence has another critical consideration: potential security exposures within enterprises. Companies must be acutely aware of ensuring employee compliance with both AI utilization and <a href=\"\/cybersecurity-perspectives\/answering-board-top-cybersecurity-questions-4-regulatory-compliance-requirements\" data-page-track=\"true\" data-page-track-value=\"cybersecurity-perspectives:unit42-threat-vector-podcas-provides-insights-into-threat-intelligence-landscape: parbase:episode 1: ais impact on cybersecurity with michael \u201csiko\u201d sikorski\">general security policies<\/a> to ensure that private data or sensitive information is not inadvertently shared or leaked. Businesses must remind employees that these are not private or confidential when using chat AI tools. <\/p>\n<p>Ultimately, Sikorsi offers this advice for businesses with AI concerns: Instead of looking at companies riding the AI wave, look at those who have been working with AI for a long time and have the background to demonstrate their success. Sikorski shares, \u201cPalo Alto Networks stands out as a trailblazer in AI adoption, spanning early malware detection, malware family identification and more recent advancements in automating <a href=\"\/blog\/tag\/security-operations-center\/\" data-page-track=\"true\" data-page-track-value=\"cybersecurity-perspectives:unit42-threat-vector-podcas-provides-insights-into-threat-intelligence-landscape: parbase:episode 1: ais impact on cybersecurity with michael \u201csiko\u201d sikorski\">security operations centers<\/a> (SOCs) to efficiently handle the deluge of alerts.\u201d <\/p>\n<p><div class=\"post-video-container\"><iframe loading=\"lazy\" width=\"560\" height=\"315\" style=\"max-width: 100%;\" src=\"https:\/\/www.youtube.com\/embed\/oRaFguZvldQ?si=oUX4v6NHdTcag7pK\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe><\/div><\/p>\n<h2>Episode 2, Part 1: Defending Against Advanced Threats with Kristopher Russo<\/h2>\n<p>In the second episode of Threat Vector, Kristopher Russo, senior threat researcher at Unit 42, and David Moulton, discuss the threat landscape and take a deeper dive into the intricate workings of <a href=\"https:\/\/unit42.paloaltonetworks.com\/muddled-libra\/\" target=\"_blank\" rel=\"noopener\" data-page-track=\"true\" data-page-track-value=\"cybersecurity-perspectives:unit42-threat-vector-podcas-provides-insights-into-threat-intelligence-landscape: parbase:episode 2 part 1: defending against advanced threats with kristopher russo\">Muddled Libra<\/a> (related to Scattered Spider and Scatter Swine). This formidable threat group poses <a href=\"\/cybersecurity-perspectives\/answering-board-top-cybersecurity-questions-1-cyber-risk-exposure\" data-page-track=\"true\" data-page-track-value=\"cybersecurity-perspectives:unit42-threat-vector-podcas-provides-insights-into-threat-intelligence-landscape: parbase:episode 2 part 1: defending against advanced threats with kristopher russo\">significant challenges<\/a> to telecommunications, technology and software automation industries. <\/p>\n<p>Russo explains how Muddled Libra works, with a few distinguishing traits. Muddled Libra employs legitimate persistence tools from trusted vendors to fly under the radar to target firms with access to high-value cryptocurrency holders. The type of data Muddled Libra is after is also highly specific \u2014 and they are very persistent in finding it.<\/p>\n<p>Muddled Libra has a signature move: exploit the 0ktapus phishing kit to craft believable authentication pages and manipulate victims through social engineering. What are some actionable steps businesses can take to safeguard the cyber environment? Tune in and stay updated. <\/p>\n<p><div class=\"post-video-container\"><iframe loading=\"lazy\" width=\"560\" height=\"315\" style=\"max-width: 100%;\" src=\"https:\/\/www.youtube.com\/embed\/Znq1fgMSFJs?si=7odUGhqUyTtftwTm\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe><\/div><\/p>\n<h2>Episode 2, Part 2: Defending Against Advanced Threats with Stephanie Regan<\/h2>\n<p>In the second part of our deep dive into Muddled Libra&#8217;s tactics, Threat Vector welcomes Stephanie Regan, a senior consultant with Unit 42 with a law enforcement background. Regan and David Moulton, discuss the challenges Muddled Libra and other threat groups pose. Threat actors are often highly persistent and can rapidly pivot when encountering roadblocks. Regan\u2019s insights demonstrate Muddled Libra\u2019s \u2014 and other threat actors\u2019 \u2014 ability to perform deep reconnaissance and determination to understand their targeted environments thoroughly.<\/p>\n<p>Regan emphasizes that <a href=\"\/cybersecurity-perspectives\/answering-board-top-cybersecurity-questions-4-regulatory-compliance-requirements\" data-page-track=\"true\" data-page-track-value=\"cybersecurity-perspectives:unit42-threat-vector-podcas-provides-insights-into-threat-intelligence-landscape: parbase:episode 2 part 2: defending against advanced threats with stephanie regan\">training users<\/a> to recognize common phishing indicators is essential as the conversation shifts into how users can counter phishing and social engineering tactics. Stronger multifactor authentication (MFA) methods and secure VPNs are critical components in defense. To bolster security, Regan recommends hard-to-fake device properties for VPN access, device certificates and registry keys.<\/p>\n<p>Regan outlines the importance of speed, detailed incident response playbooks and the necessity of out-of-band communications to recover from attacks. She provides insights into a threat actor\u2019s targeted attack on a business and its recovery. As threats evolve and share resources in the ransomware market, companies must stay ahead by adapting and <a href=\"\/cybersecurity-perspectives\/platforms-reduce-time\" data-page-track=\"true\" data-page-track-value=\"cybersecurity-perspectives:unit42-threat-vector-podcas-provides-insights-into-threat-intelligence-landscape: parbase:episode 2 part 2: defending against advanced threats with stephanie regan\">enhancing their security measures<\/a>.<\/p>\n<p><div class=\"post-video-container\"><iframe loading=\"lazy\" width=\"560\" height=\"315\" style=\"max-width: 100%;\" src=\"https:\/\/www.youtube.com\/embed\/UXsY3CJwrfA?si=WoS0pB3TM6ryB2oe\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe><\/div><\/p>\n<p>Threat Vector provides insights that are both enlightening and cautionary. Still, these summaries only scratch the surface of the expert perspectives in the full podcast episodes. CISOs, C-level executives or anyone with a vested interest in safeguarding the digital world can benefit from subscribing to the Unit 42 Threat Vector podcast. Discover firsthand the invaluable knowledge, strategies and real-world stories cybersecurity experts share. <\/p>\n<p>Threat Vector is your compass in the world of cybersecurity. Listen to all current segments on <a href=\"https:\/\/www.youtube.com\/playlist?list=PLaKGTLgARHpO1zjPmTlWuYsYEKR0SKUPa\" target=\"_blank\" rel=\"noopener\" data-page-track=\"true\" data-page-track-value=\"cybersecurity-perspectives:unit42-threat-vector-podcas-provides-insights-into-threat-intelligence-landscape: parbase:episode 2 part 2: defending against advanced threats with stephanie regan\">Unit 42 YouTube channel<\/a> and <a href=\"https:\/\/open.spotify.com\/show\/4c2nfNHjidk9dsRzDJU07U\" target=\"_blank\" rel=\"noopener\" data-page-track=\"true\" data-page-track-value=\"cybersecurity-perspectives:unit42-threat-vector-podcas-provides-insights-into-threat-intelligence-landscape: parbase:episode 2 part 2: defending against advanced threats with stephanie regan\">Spotify<\/a> and <a href=\"https:\/\/thecyberwire.com\/podcasts\/daily-podcast\" target=\"_blank\" rel=\"noopener\" data-page-track=\"true\" data-page-track-value=\"cybersecurity-perspectives:unit42-threat-vector-podcas-provides-insights-into-threat-intelligence-landscape: parbase:episode 2 part 2: defending against advanced threats with stephanie regan\">subscribe<\/a> to the CyberWire Daily to hear more. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Explore key cyber threats on the Unit 42 Threat Vector podcast.<\/p>\n","protected":false},"author":2,"featured_media":2993,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15],"tags":[],"coauthors":[34],"class_list":["post-53","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-staying-ahead-of-evolving-threats"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Unit 42 Threat Vector Podcast Provides Insights into Threat Intelligence Landscape - Perspectives<\/title>\n<meta name=\"description\" content=\"Explore key cyber threats on the Unit 42 Threat Vector podcast.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/unit42-threat-vector-podcas-provides-insights-into-threat-intelligence-landscape\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Unit 42 Threat Vector Podcast Provides Insights into Threat Intelligence Landscape - Perspectives\" \/>\n<meta property=\"og:description\" content=\"Explore key cyber threats on the Unit 42 Threat Vector podcast.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/unit42-threat-vector-podcas-provides-insights-into-threat-intelligence-landscape\/\" \/>\n<meta property=\"og:site_name\" content=\"Perspectives\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-19T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-13T06:33:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2023\/12\/Palo-Alto-Threat-Vector1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2400\" \/>\n\t<meta property=\"og:image:height\" content=\"1256\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"David Moulton\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/origin-www.paloaltonetworks.in\\\/perspectives\\\/unit42-threat-vector-podcas-provides-insights-into-threat-intelligence-landscape\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/origin-www.paloaltonetworks.in\\\/perspectives\\\/unit42-threat-vector-podcas-provides-insights-into-threat-intelligence-landscape\\\/\"},\"author\":{\"name\":\"Avinash\",\"@id\":\"https:\\\/\\\/origin-www.paloaltonetworks.in\\\/perspectives\\\/#\\\/schema\\\/person\\\/ac652ee87225b60d100bcfb4de5d86f7\"},\"headline\":\"Unit 42 Threat Vector Podcast Provides Insights into Threat Intelligence Landscape\",\"datePublished\":\"2023-12-19T00:00:00+00:00\",\"dateModified\":\"2025-05-13T06:33:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/origin-www.paloaltonetworks.in\\\/perspectives\\\/unit42-threat-vector-podcas-provides-insights-into-threat-intelligence-landscape\\\/\"},\"wordCount\":936,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/origin-www.paloaltonetworks.in\\\/perspectives\\\/unit42-threat-vector-podcas-provides-insights-into-threat-intelligence-landscape\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/origin-www.paloaltonetworks.in\\\/perspectives\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/Palo-Alto-Threat-Vector1.jpg\",\"articleSection\":[\"Staying Ahead of Evolving Threats\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/origin-www.paloaltonetworks.in\\\/perspectives\\\/unit42-threat-vector-podcas-provides-insights-into-threat-intelligence-landscape\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/origin-www.paloaltonetworks.in\\\/perspectives\\\/unit42-threat-vector-podcas-provides-insights-into-threat-intelligence-landscape\\\/\",\"url\":\"https:\\\/\\\/origin-www.paloaltonetworks.in\\\/perspectives\\\/unit42-threat-vector-podcas-provides-insights-into-threat-intelligence-landscape\\\/\",\"name\":\"Unit 42 Threat Vector Podcast Provides Insights into Threat Intelligence Landscape - Perspectives\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/origin-www.paloaltonetworks.in\\\/perspectives\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/origin-www.paloaltonetworks.in\\\/perspectives\\\/unit42-threat-vector-podcas-provides-insights-into-threat-intelligence-landscape\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/origin-www.paloaltonetworks.in\\\/perspectives\\\/unit42-threat-vector-podcas-provides-insights-into-threat-intelligence-landscape\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/origin-www.paloaltonetworks.in\\\/perspectives\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/Palo-Alto-Threat-Vector1.jpg\",\"datePublished\":\"2023-12-19T00:00:00+00:00\",\"dateModified\":\"2025-05-13T06:33:47+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/origin-www.paloaltonetworks.in\\\/perspectives\\\/#\\\/schema\\\/person\\\/ac652ee87225b60d100bcfb4de5d86f7\"},\"description\":\"Explore key cyber threats on the Unit 42 Threat Vector podcast.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/origin-www.paloaltonetworks.in\\\/perspectives\\\/unit42-threat-vector-podcas-provides-insights-into-threat-intelligence-landscape\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/origin-www.paloaltonetworks.in\\\/perspectives\\\/unit42-threat-vector-podcas-provides-insights-into-threat-intelligence-landscape\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/origin-www.paloaltonetworks.in\\\/perspectives\\\/unit42-threat-vector-podcas-provides-insights-into-threat-intelligence-landscape\\\/#primaryimage\",\"url\":\"https:\\\/\\\/origin-www.paloaltonetworks.in\\\/perspectives\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/Palo-Alto-Threat-Vector1.jpg\",\"contentUrl\":\"https:\\\/\\\/origin-www.paloaltonetworks.in\\\/perspectives\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/Palo-Alto-Threat-Vector1.jpg\",\"width\":2400,\"height\":1256},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/origin-www.paloaltonetworks.in\\\/perspectives\\\/unit42-threat-vector-podcas-provides-insights-into-threat-intelligence-landscape\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/origin-www.paloaltonetworks.in\\\/perspectives\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Unit 42 Threat Vector Podcast Provides Insights into Threat Intelligence Landscape\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/origin-www.paloaltonetworks.in\\\/perspectives\\\/#website\",\"url\":\"https:\\\/\\\/origin-www.paloaltonetworks.in\\\/perspectives\\\/\",\"name\":\"Perspectives\",\"description\":\"What\u2019s next for business and technology innovators.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/origin-www.paloaltonetworks.in\\\/perspectives\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/origin-www.paloaltonetworks.in\\\/perspectives\\\/#\\\/schema\\\/person\\\/ac652ee87225b60d100bcfb4de5d86f7\",\"name\":\"Avinash\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/origin-www.paloaltonetworks.in\\\/perspectives\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/panw_master-twitter-profile-pic-400x400-1-150x150.png99030a116fee62042a76fe088b31faa9\",\"url\":\"https:\\\/\\\/origin-www.paloaltonetworks.in\\\/perspectives\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/panw_master-twitter-profile-pic-400x400-1-150x150.png\",\"contentUrl\":\"https:\\\/\\\/origin-www.paloaltonetworks.in\\\/perspectives\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/panw_master-twitter-profile-pic-400x400-1-150x150.png\",\"caption\":\"Avinash\"},\"description\":\"Lorem Ipsum is simply dummy text of the printing and typesetting industry.\",\"url\":\"https:\\\/\\\/origin-www.paloaltonetworks.in\\\/perspectives\\\/author\\\/akonangi\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Unit 42 Threat Vector Podcast Provides Insights into Threat Intelligence Landscape - Perspectives","description":"Explore key cyber threats on the Unit 42 Threat Vector podcast.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/unit42-threat-vector-podcas-provides-insights-into-threat-intelligence-landscape\/","og_locale":"en_US","og_type":"article","og_title":"Unit 42 Threat Vector Podcast Provides Insights into Threat Intelligence Landscape - Perspectives","og_description":"Explore key cyber threats on the Unit 42 Threat Vector podcast.","og_url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/unit42-threat-vector-podcas-provides-insights-into-threat-intelligence-landscape\/","og_site_name":"Perspectives","article_published_time":"2023-12-19T00:00:00+00:00","article_modified_time":"2025-05-13T06:33:47+00:00","og_image":[{"width":2400,"height":1256,"url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2023\/12\/Palo-Alto-Threat-Vector1.jpg","type":"image\/jpeg"}],"author":"David Moulton","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/unit42-threat-vector-podcas-provides-insights-into-threat-intelligence-landscape\/#article","isPartOf":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/unit42-threat-vector-podcas-provides-insights-into-threat-intelligence-landscape\/"},"author":{"name":"Avinash","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/ac652ee87225b60d100bcfb4de5d86f7"},"headline":"Unit 42 Threat Vector Podcast Provides Insights into Threat Intelligence Landscape","datePublished":"2023-12-19T00:00:00+00:00","dateModified":"2025-05-13T06:33:47+00:00","mainEntityOfPage":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/unit42-threat-vector-podcas-provides-insights-into-threat-intelligence-landscape\/"},"wordCount":936,"commentCount":0,"image":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/unit42-threat-vector-podcas-provides-insights-into-threat-intelligence-landscape\/#primaryimage"},"thumbnailUrl":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2023\/12\/Palo-Alto-Threat-Vector1.jpg","articleSection":["Staying Ahead of Evolving Threats"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/origin-www.paloaltonetworks.in\/perspectives\/unit42-threat-vector-podcas-provides-insights-into-threat-intelligence-landscape\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/unit42-threat-vector-podcas-provides-insights-into-threat-intelligence-landscape\/","url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/unit42-threat-vector-podcas-provides-insights-into-threat-intelligence-landscape\/","name":"Unit 42 Threat Vector Podcast Provides Insights into Threat Intelligence Landscape - Perspectives","isPartOf":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#website"},"primaryImageOfPage":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/unit42-threat-vector-podcas-provides-insights-into-threat-intelligence-landscape\/#primaryimage"},"image":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/unit42-threat-vector-podcas-provides-insights-into-threat-intelligence-landscape\/#primaryimage"},"thumbnailUrl":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2023\/12\/Palo-Alto-Threat-Vector1.jpg","datePublished":"2023-12-19T00:00:00+00:00","dateModified":"2025-05-13T06:33:47+00:00","author":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/ac652ee87225b60d100bcfb4de5d86f7"},"description":"Explore key cyber threats on the Unit 42 Threat Vector podcast.","breadcrumb":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/unit42-threat-vector-podcas-provides-insights-into-threat-intelligence-landscape\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/origin-www.paloaltonetworks.in\/perspectives\/unit42-threat-vector-podcas-provides-insights-into-threat-intelligence-landscape\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/unit42-threat-vector-podcas-provides-insights-into-threat-intelligence-landscape\/#primaryimage","url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2023\/12\/Palo-Alto-Threat-Vector1.jpg","contentUrl":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2023\/12\/Palo-Alto-Threat-Vector1.jpg","width":2400,"height":1256},{"@type":"BreadcrumbList","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/unit42-threat-vector-podcas-provides-insights-into-threat-intelligence-landscape\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/"},{"@type":"ListItem","position":2,"name":"Unit 42 Threat Vector Podcast Provides Insights into Threat Intelligence Landscape"}]},{"@type":"WebSite","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#website","url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/","name":"Perspectives","description":"What\u2019s next for business and technology innovators.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/ac652ee87225b60d100bcfb4de5d86f7","name":"Avinash","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/02\/panw_master-twitter-profile-pic-400x400-1-150x150.png99030a116fee62042a76fe088b31faa9","url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/02\/panw_master-twitter-profile-pic-400x400-1-150x150.png","contentUrl":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/02\/panw_master-twitter-profile-pic-400x400-1-150x150.png","caption":"Avinash"},"description":"Lorem Ipsum is simply dummy text of the printing and typesetting industry.","url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/author\/akonangi\/"}]}},"_links":{"self":[{"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/posts\/53","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/comments?post=53"}],"version-history":[{"count":3,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/posts\/53\/revisions"}],"predecessor-version":[{"id":288,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/posts\/53\/revisions\/288"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/media\/2993"}],"wp:attachment":[{"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/media?parent=53"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/categories?post=53"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/tags?post=53"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/coauthors?post=53"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}