{"id":54,"date":"2023-12-19T00:00:00","date_gmt":"2023-12-19T00:00:00","guid":{"rendered":"http:\/\/localhost\/wordpress\/?p=54"},"modified":"2025-03-13T07:38:09","modified_gmt":"2025-03-13T07:38:09","slug":"unit-42-threat-vector-podcast-provides-insights-into-ir-sniping-and-ai-changing-face-of-cyberthreats","status":"publish","type":"post","link":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/unit-42-threat-vector-podcast-provides-insights-into-ir-sniping-and-ai-changing-face-of-cyberthreats\/","title":{"rendered":"Unit 42 Threat Vector Podcast: Insights into IR Sniping and AI\u2019s Changing Face of Cyberthreats"},"content":{"rendered":"<p>In today&#8217;s rapidly evolving cybersecurity landscape, having a proficient security team in place is not enough. Organizations must understand the nuances of modern risks. The third and fourth episodes of the Unit 42<sup>\u00ae<\/sup> Threat Vector podcast shed light on two critical aspects: <b>IR sniping<\/b> and <b>the disruptive role of AI in cyberattacks<\/b>.<\/p>\n<p>These factors revolutionize incident response strategies and prompt organizations to recalibrate their defense mechanisms against increasingly sophisticated threats. These episodes provide invaluable insights for business leaders and emphasize the need for proactive and agile cybersecurity approaches that adapt to the ever-evolving threat landscape.<\/p>\n<p>Let\u2019s look at some of the highlights of episodes three and four of the Threat Vector podcast. You can also read highlights from episodes one and two <a href=\"https:\/\/www.paloaltonetworks.ca\/cybersecurity-perspectives\/unit42-threat-vector-podcas-provides-insights-into-threat-intelligence-landscape\" data-page-track=\"true\" data-page-track-value=\"cybersecurity-perspectives:unit-42-threat-vector-podcast-provides-insights-into-ir-sniping-and-ai-changing-face-of-cyberthreats: parbase:unit 42 threat vector podcast: insights into ir sniping and ais changing face of cyberthreats\">here<\/a> and <a href=\"https:\/\/thecyberwire.com\/podcasts\/daily-podcast\" target=\"_blank\" rel=\"noopener\" data-page-track=\"true\" data-page-track-value=\"cybersecurity-perspectives:unit-42-threat-vector-podcast-provides-insights-into-ir-sniping-and-ai-changing-face-of-cyberthreats: parbase:unit 42 threat vector podcast: insights into ir sniping and ais changing face of cyberthreats\">subscribe<\/a> to hear future segments on CyberWire Daily.<\/p>\n<h2>Episode 3: Mastering IR Sniping: A Deliberate Approach to Cybersecurity Investigations with Chris Brewer<\/h2>\n<p>In the third episode of Threat Vector, Chris Brewer, director at Unit 42 and expert in digital forensics with decades of experience, and David Moulton, director of thought leadership for Unit 42, delve into the world of incident response (IR) sniping \u2014 a deliberate and targeted methodology that accelerates investigation results, and a gamechanger for cybersecurity. <\/p>\n<p><b>IR sniping follows three main guiding principles:<\/b><\/p>\n<ul>\n<li>Low card exchange: Every contact leaves a trace.<\/li>\n<li>Occam\u2019s razor: The simplest explanation is often the right one.<\/li>\n<li>The Alexiou Principle:\n<ul>\n<li>What questions are you trying to answer?<\/li>\n<li>What data do you need to answer those questions?<\/li>\n<li>How do you analyze that data?<\/li>\n<li>What does that data tell you?<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><b>IR sniping makes cybersecurity more efficient by answering the questions people care about:<\/b><\/p>\n<ul>\n<li>What did the attackers take? <\/li>\n<li>Are they still in the environment? <\/li>\n<li>Where did they go? <\/li>\n<li>How did they get in?<\/li>\n<\/ul>\n<p>IR sniping provides better results, faster, and a constant quality control check on your data. By utilizing IR sniping, most investigations can be solved within 72 hours.<\/p>\n<p>For further expert insights and strategies to enhance your incident response tactics, tune in to the five-minute interview here.<\/p>\n<p><div class=\"post-video-container\"><iframe loading=\"lazy\" width=\"560\" height=\"315\" style=\"max-width: 100%;\" src=\"https:\/\/www.youtube.com\/embed\/i-K7xPiEePU?si=vi1k_lOomunzcs9g\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe><\/div><\/p>\n<p>Join Chris Brewer for a webinar on the latest advancements in cybersecurity: <a href=\"https:\/\/register.paloaltonetworks.com\/cortexshorttrackexpertsession5\" target=\"_blank\" rel=\"noopener\" data-page-track=\"true\" data-page-track-value=\"cybersecurity-perspectives:unit-42-threat-vector-podcast-provides-insights-into-ir-sniping-and-ai-changing-face-of-cyberthreats: parbase:episode 3: mastering ir sniping: a deliberate approach to cybersecurity investigations with chris brewer\"> Unit 42 &#8211; IR\/Forensics: Product &amp; Process<\/a> on November 23, 2023, at 2 p.m. CT.<\/p>\n<h2>Episode 4: From Nation-States to Cybercriminals, AI&#8217;s Influence on Attacks with Wendi Whitmore<\/h2>\n<p><i>\u201cAI is game-changing in terms of the impact it\u2019s going to have on attacks and then, in particular, the attacker\u2019s ability to move faster.\u201d<\/i><\/p>\n<p>Wendi Whitmore, SVP of Unit 42, begins Episode 4 of Threat Vector with this sobering statement. <\/p>\n<p>Whitmore was an inaugural member of the first cyber safety review board for the U.S. Department of Homeland Security, serves on the industry advisory board for the Duke University Master of Engineering in Cybersecurity and is a member of the World Economic Forum\u2019s Global Future Council on the Future of Cybersecurity. Whitmore and David Moulton, director of thought leadership for Unit 42, discuss the increasing scale, sophistication and speed of cyberattacks \u2014 and how organizations can stay vigilant in this <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2023\/09\/combating-ransomware-attacks-insights\/\" data-page-track=\"true\" data-page-track-value=\"cybersecurity-perspectives:unit-42-threat-vector-podcast-provides-insights-into-ir-sniping-and-ai-changing-face-of-cyberthreats: parbase:episode 4: from nation-states to cybercriminals ais influence on attacks with wendi whitmore\">rapidly changing threat landscape<\/a>.<\/p>\n<p>Examples like <a href=\"https:\/\/unit42.paloaltonetworks.com\/muddled-libra\/\" data-page-track=\"true\" data-page-track-value=\"cybersecurity-perspectives:unit-42-threat-vector-podcast-provides-insights-into-ir-sniping-and-ai-changing-face-of-cyberthreats: parbase:episode 4: from nation-states to cybercriminals ais influence on attacks with wendi whitmore\">Muddled Libra and Scattered Spider<\/a> and other nation-state actors and cybercriminals emphasize that attackers understand how IT business processes and IT departments work \u2014 and so they leverage commonly used apps to glean information from business environments. This information enables them to operate faster and more effectively, especially by employing social engineering tactics.<\/p>\n<p>To protect against quicker, more creative and increasingly larger-scale threats and respond at every stage of the event, businesses must focus on:\n                    <\/p>\n<ul>\n<li>The speed of their response<\/li>\n<li>Automated integration of security tools<\/li>\n<li>Operationalized capabilities and processes <\/li>\n<\/ul>\n<p>Organizations must stay vigilant and up to date on current technology to <a href=\"https:\/\/start.paloaltonetworks.com\/2023-unit42-ransomware-extortion-report\" target=\"_blank\" rel=\"noopener\" data-page-track=\"true\" data-page-track-value=\"cybersecurity-perspectives:unit-42-threat-vector-podcast-provides-insights-into-ir-sniping-and-ai-changing-face-of-cyberthreats: parbase:episode 4: from nation-states to cybercriminals ais influence on attacks with wendi whitmore\">defend against threat actors<\/a> amidst the rapidly changing threat landscape. To learn more and to listen to the interview, click here:<\/p>\n<p><div class=\"post-video-container\"><iframe loading=\"lazy\" width=\"560\" height=\"315\" style=\"max-width: 100%;\" src=\"https:\/\/www.youtube.com\/embed\/_m-e3u6L7C8?si=zGWp44ysKNQoS67J\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe><\/div><\/p>\n<p>Threat Vector provides insights that are both enlightening and cautionary. Still, these summaries only scratch the surface of the expert perspectives in the full podcast episodes. <\/p>\n<p>CISOs, C-level executives or anyone with a vested interest in safeguarding the digital world can benefit from subscribing to the Unit 42 Threat Vector podcast. Discover firsthand the invaluable knowledge, strategies and real-world stories cybersecurity experts share. <\/p>\n<p>Threat Vector is your compass in the world of cybersecurity. Listen to all current segments on <a href=\"https:\/\/www.youtube.com\/playlist?list=PLaKGTLgARHpO1zjPmTlWuYsYEKR0SKUPa\" target=\"_blank\" rel=\"noopener\" data-page-track=\"true\" data-page-track-value=\"cybersecurity-perspectives:unit-42-threat-vector-podcast-provides-insights-into-ir-sniping-and-ai-changing-face-of-cyberthreats: parbase:episode 4: from nation-states to cybercriminals ais influence on attacks with wendi whitmore\">Unit 42 YouTube channel<\/a> and <a href=\"https:\/\/open.spotify.com\/show\/4c2nfNHjidk9dsRzDJU07U\" target=\"_blank\" rel=\"noopener\" data-page-track=\"true\" data-page-track-value=\"cybersecurity-perspectives:unit-42-threat-vector-podcast-provides-insights-into-ir-sniping-and-ai-changing-face-of-cyberthreats: parbase:episode 4: from nation-states to cybercriminals ais influence on attacks with wendi whitmore\">Spotify<\/a>, and <a href=\"https:\/\/thecyberwire.com\/podcasts\/daily-podcast\" target=\"_blank\" rel=\"noopener\" data-page-track=\"true\" data-page-track-value=\"cybersecurity-perspectives:unit-42-threat-vector-podcast-provides-insights-into-ir-sniping-and-ai-changing-face-of-cyberthreats: parbase:episode 4: from nation-states to cybercriminals ais influence on attacks with wendi whitmore\">subscribe<\/a> to the CyberWire Daily to hear more. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Explore IR sniping and the prevalance of AI-driven threats.<\/p>\n","protected":false},"author":2,"featured_media":289,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[16,15],"tags":[],"coauthors":[34],"class_list":["post-54","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ai","category-staying-ahead-of-evolving-threats"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Unit 42 Threat Vector Podcast: Insights into IR Sniping and AI\u2019s Changing Face of Cyberthreats - Perspectives<\/title>\n<meta name=\"description\" content=\"Explore IR sniping and the prevalance of AI-driven threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/unit-42-threat-vector-podcast-provides-insights-into-ir-sniping-and-ai-changing-face-of-cyberthreats\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Unit 42 Threat Vector Podcast: Insights into IR Sniping and AI\u2019s Changing Face of Cyberthreats - Perspectives\" \/>\n<meta property=\"og:description\" content=\"Explore IR sniping and the prevalance of AI-driven threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/unit-42-threat-vector-podcast-provides-insights-into-ir-sniping-and-ai-changing-face-of-cyberthreats\/\" \/>\n<meta property=\"og:site_name\" content=\"Perspectives\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-19T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-13T07:38:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2023\/12\/unit42-threat-intelligence-podcast.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"David Moulton\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/origin-www.paloaltonetworks.in\\\/perspectives\\\/unit-42-threat-vector-podcast-provides-insights-into-ir-sniping-and-ai-changing-face-of-cyberthreats\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/origin-www.paloaltonetworks.in\\\/perspectives\\\/unit-42-threat-vector-podcast-provides-insights-into-ir-sniping-and-ai-changing-face-of-cyberthreats\\\/\"},\"author\":{\"name\":\"Avinash\",\"@id\":\"https:\\\/\\\/origin-www.paloaltonetworks.in\\\/perspectives\\\/#\\\/schema\\\/person\\\/ac652ee87225b60d100bcfb4de5d86f7\"},\"headline\":\"Unit 42 Threat Vector Podcast: Insights into IR Sniping and AI\u2019s Changing Face of Cyberthreats\",\"datePublished\":\"2023-12-19T00:00:00+00:00\",\"dateModified\":\"2025-03-13T07:38:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/origin-www.paloaltonetworks.in\\\/perspectives\\\/unit-42-threat-vector-podcast-provides-insights-into-ir-sniping-and-ai-changing-face-of-cyberthreats\\\/\"},\"wordCount\":726,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/origin-www.paloaltonetworks.in\\\/perspectives\\\/unit-42-threat-vector-podcast-provides-insights-into-ir-sniping-and-ai-changing-face-of-cyberthreats\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/origin-www.paloaltonetworks.in\\\/perspectives\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/unit42-threat-intelligence-podcast.png\",\"articleSection\":[\"AI\",\"Staying Ahead of Evolving Threats\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/origin-www.paloaltonetworks.in\\\/perspectives\\\/unit-42-threat-vector-podcast-provides-insights-into-ir-sniping-and-ai-changing-face-of-cyberthreats\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/origin-www.paloaltonetworks.in\\\/perspectives\\\/unit-42-threat-vector-podcast-provides-insights-into-ir-sniping-and-ai-changing-face-of-cyberthreats\\\/\",\"url\":\"https:\\\/\\\/origin-www.paloaltonetworks.in\\\/perspectives\\\/unit-42-threat-vector-podcast-provides-insights-into-ir-sniping-and-ai-changing-face-of-cyberthreats\\\/\",\"name\":\"Unit 42 Threat Vector Podcast: Insights into IR Sniping and AI\u2019s Changing Face of Cyberthreats - Perspectives\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/origin-www.paloaltonetworks.in\\\/perspectives\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/origin-www.paloaltonetworks.in\\\/perspectives\\\/unit-42-threat-vector-podcast-provides-insights-into-ir-sniping-and-ai-changing-face-of-cyberthreats\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/origin-www.paloaltonetworks.in\\\/perspectives\\\/unit-42-threat-vector-podcast-provides-insights-into-ir-sniping-and-ai-changing-face-of-cyberthreats\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/origin-www.paloaltonetworks.in\\\/perspectives\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/unit42-threat-intelligence-podcast.png\",\"datePublished\":\"2023-12-19T00:00:00+00:00\",\"dateModified\":\"2025-03-13T07:38:09+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/origin-www.paloaltonetworks.in\\\/perspectives\\\/#\\\/schema\\\/person\\\/ac652ee87225b60d100bcfb4de5d86f7\"},\"description\":\"Explore IR sniping and the prevalance of AI-driven threats.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/origin-www.paloaltonetworks.in\\\/perspectives\\\/unit-42-threat-vector-podcast-provides-insights-into-ir-sniping-and-ai-changing-face-of-cyberthreats\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/origin-www.paloaltonetworks.in\\\/perspectives\\\/unit-42-threat-vector-podcast-provides-insights-into-ir-sniping-and-ai-changing-face-of-cyberthreats\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/origin-www.paloaltonetworks.in\\\/perspectives\\\/unit-42-threat-vector-podcast-provides-insights-into-ir-sniping-and-ai-changing-face-of-cyberthreats\\\/#primaryimage\",\"url\":\"https:\\\/\\\/origin-www.paloaltonetworks.in\\\/perspectives\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/unit42-threat-intelligence-podcast.png\",\"contentUrl\":\"https:\\\/\\\/origin-www.paloaltonetworks.in\\\/perspectives\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/unit42-threat-intelligence-podcast.png\",\"width\":1200,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/origin-www.paloaltonetworks.in\\\/perspectives\\\/unit-42-threat-vector-podcast-provides-insights-into-ir-sniping-and-ai-changing-face-of-cyberthreats\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/origin-www.paloaltonetworks.in\\\/perspectives\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Unit 42 Threat Vector Podcast: Insights into IR Sniping and AI\u2019s Changing Face of Cyberthreats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/origin-www.paloaltonetworks.in\\\/perspectives\\\/#website\",\"url\":\"https:\\\/\\\/origin-www.paloaltonetworks.in\\\/perspectives\\\/\",\"name\":\"Perspectives\",\"description\":\"What\u2019s next for business and technology innovators.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/origin-www.paloaltonetworks.in\\\/perspectives\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/origin-www.paloaltonetworks.in\\\/perspectives\\\/#\\\/schema\\\/person\\\/ac652ee87225b60d100bcfb4de5d86f7\",\"name\":\"Avinash\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/origin-www.paloaltonetworks.in\\\/perspectives\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/panw_master-twitter-profile-pic-400x400-1-150x150.png99030a116fee62042a76fe088b31faa9\",\"url\":\"https:\\\/\\\/origin-www.paloaltonetworks.in\\\/perspectives\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/panw_master-twitter-profile-pic-400x400-1-150x150.png\",\"contentUrl\":\"https:\\\/\\\/origin-www.paloaltonetworks.in\\\/perspectives\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/panw_master-twitter-profile-pic-400x400-1-150x150.png\",\"caption\":\"Avinash\"},\"description\":\"Lorem Ipsum is simply dummy text of the printing and typesetting industry.\",\"url\":\"https:\\\/\\\/origin-www.paloaltonetworks.in\\\/perspectives\\\/author\\\/akonangi\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Unit 42 Threat Vector Podcast: Insights into IR Sniping and AI\u2019s Changing Face of Cyberthreats - Perspectives","description":"Explore IR sniping and the prevalance of AI-driven threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/unit-42-threat-vector-podcast-provides-insights-into-ir-sniping-and-ai-changing-face-of-cyberthreats\/","og_locale":"en_US","og_type":"article","og_title":"Unit 42 Threat Vector Podcast: Insights into IR Sniping and AI\u2019s Changing Face of Cyberthreats - Perspectives","og_description":"Explore IR sniping and the prevalance of AI-driven threats.","og_url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/unit-42-threat-vector-podcast-provides-insights-into-ir-sniping-and-ai-changing-face-of-cyberthreats\/","og_site_name":"Perspectives","article_published_time":"2023-12-19T00:00:00+00:00","article_modified_time":"2025-03-13T07:38:09+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2023\/12\/unit42-threat-intelligence-podcast.png","type":"image\/png"}],"author":"David Moulton","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/unit-42-threat-vector-podcast-provides-insights-into-ir-sniping-and-ai-changing-face-of-cyberthreats\/#article","isPartOf":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/unit-42-threat-vector-podcast-provides-insights-into-ir-sniping-and-ai-changing-face-of-cyberthreats\/"},"author":{"name":"Avinash","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/ac652ee87225b60d100bcfb4de5d86f7"},"headline":"Unit 42 Threat Vector Podcast: Insights into IR Sniping and AI\u2019s Changing Face of Cyberthreats","datePublished":"2023-12-19T00:00:00+00:00","dateModified":"2025-03-13T07:38:09+00:00","mainEntityOfPage":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/unit-42-threat-vector-podcast-provides-insights-into-ir-sniping-and-ai-changing-face-of-cyberthreats\/"},"wordCount":726,"commentCount":0,"image":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/unit-42-threat-vector-podcast-provides-insights-into-ir-sniping-and-ai-changing-face-of-cyberthreats\/#primaryimage"},"thumbnailUrl":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2023\/12\/unit42-threat-intelligence-podcast.png","articleSection":["AI","Staying Ahead of Evolving Threats"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/origin-www.paloaltonetworks.in\/perspectives\/unit-42-threat-vector-podcast-provides-insights-into-ir-sniping-and-ai-changing-face-of-cyberthreats\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/unit-42-threat-vector-podcast-provides-insights-into-ir-sniping-and-ai-changing-face-of-cyberthreats\/","url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/unit-42-threat-vector-podcast-provides-insights-into-ir-sniping-and-ai-changing-face-of-cyberthreats\/","name":"Unit 42 Threat Vector Podcast: Insights into IR Sniping and AI\u2019s Changing Face of Cyberthreats - Perspectives","isPartOf":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#website"},"primaryImageOfPage":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/unit-42-threat-vector-podcast-provides-insights-into-ir-sniping-and-ai-changing-face-of-cyberthreats\/#primaryimage"},"image":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/unit-42-threat-vector-podcast-provides-insights-into-ir-sniping-and-ai-changing-face-of-cyberthreats\/#primaryimage"},"thumbnailUrl":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2023\/12\/unit42-threat-intelligence-podcast.png","datePublished":"2023-12-19T00:00:00+00:00","dateModified":"2025-03-13T07:38:09+00:00","author":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/ac652ee87225b60d100bcfb4de5d86f7"},"description":"Explore IR sniping and the prevalance of AI-driven threats.","breadcrumb":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/unit-42-threat-vector-podcast-provides-insights-into-ir-sniping-and-ai-changing-face-of-cyberthreats\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/origin-www.paloaltonetworks.in\/perspectives\/unit-42-threat-vector-podcast-provides-insights-into-ir-sniping-and-ai-changing-face-of-cyberthreats\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/unit-42-threat-vector-podcast-provides-insights-into-ir-sniping-and-ai-changing-face-of-cyberthreats\/#primaryimage","url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2023\/12\/unit42-threat-intelligence-podcast.png","contentUrl":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2023\/12\/unit42-threat-intelligence-podcast.png","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/unit-42-threat-vector-podcast-provides-insights-into-ir-sniping-and-ai-changing-face-of-cyberthreats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/"},{"@type":"ListItem","position":2,"name":"Unit 42 Threat Vector Podcast: Insights into IR Sniping and AI\u2019s Changing Face of Cyberthreats"}]},{"@type":"WebSite","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#website","url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/","name":"Perspectives","description":"What\u2019s next for business and technology innovators.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/ac652ee87225b60d100bcfb4de5d86f7","name":"Avinash","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/02\/panw_master-twitter-profile-pic-400x400-1-150x150.png99030a116fee62042a76fe088b31faa9","url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/02\/panw_master-twitter-profile-pic-400x400-1-150x150.png","contentUrl":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/02\/panw_master-twitter-profile-pic-400x400-1-150x150.png","caption":"Avinash"},"description":"Lorem Ipsum is simply dummy text of the printing and typesetting industry.","url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/author\/akonangi\/"}]}},"_links":{"self":[{"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/posts\/54","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/comments?post=54"}],"version-history":[{"count":2,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/posts\/54\/revisions"}],"predecessor-version":[{"id":294,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/posts\/54\/revisions\/294"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/media\/289"}],"wp:attachment":[{"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/media?parent=54"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/categories?post=54"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/tags?post=54"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/coauthors?post=54"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}