Episode 18

Incident Response War Stories: How We Stop Real-World Cyberattacks

00:00:00
/
01:07:18

August 19th, 2025

1 hr 7 mins 18 secs

Season 2

Your Hosts

About this Episode

Welcome to the Scinary Information Nexus! This week, the beer is flowing and the IR line is ringing off the hook. Join Richard Martin, Joseph Hamilton, Mario Ortiz, and Brazos Wortham as they pull back the curtain on the chaotic, non-stop world of Incident Response.

When an attacker is inside your network, every second counts. The team shares real-world stories from the cybersecurity front lines, breaking down the attacks that are hitting organizations right now and the playbook for how to fight back.

In this episode, we expose:

  • The "Oh Sh*t!" Moment: The real stages of Incident Response.
  • The "ClickFix" Attack: How SEO poisoning tricks users into handing over the keys.
  • Business Email Compromise (BEC): How one click can infect an entire network.
  • MFA Isn't Enough: Bypassing security with Adversary-in-the-Middle proxy attacks.
  • Your Biggest Weakness: Why misconfigured SSL-VPNs are a gateway for ransomware.
  • The Great Debate: Who has better logs, Microsoft O365 or Google Workspace?
  • Portable Executables: The reason "no local admin rights" won't save you.
  • Your First Move: What to do (and NOT do) when you find an intruder.

From compromised student accounts to brazen attackers who don't bother hiding their tracks, this is an unfiltered look at what it takes to defend a network.


Connect with Scinary Cybersecurity:

https://www.scinary.com
https://x.com/scinarycyber
https://www.linkedin.com/company/scinarycyber/

incidentresponse #cybersecurity #infosec