Unit 42 leaders Ryan Olson and Rick Howard present another another episode of their "Don't Panic" podcast, where they break down the big issues in cyber security and tell you why you don't need to panic.
This week's episode is about Watering Hole attacks. This technique involves compromising specific websites to target their readers with malware.
Subscribe at: iTunes Google Play LibSyn
Send us feedback via Twitter:
Unit 42 ( @unit42_intel )
Ryan (@ireo)
Rick (@raceBannon99)
Related Malware Resources
![Pictorial representation of phishing or cybersquatting using GenAI keywords. Glowing cube with the letters 'AI' illuminated in blue, centered on a complex network of interconnected circuits and digital nodes, suggesting advanced technology and artificial intelligence themes.](https://unit42.paloaltonetworks.com/wp-content/uploads/2024/07/03_Security-Technology_Category_1920x900-786x368.jpg)
![Representation of accelerating malware analysis. Two professionals working in a high-tech monitoring room filled with large screen displays showing data and graphs. One person is seated looking at a monitor, while the other, wearing glasses, is deep in thought.](https://unit42.paloaltonetworks.com/wp-content/uploads/2024/07/01_Security-Technology_Category_1505x922-718x440.jpg)
![A digital concept of BadPack malware showing a large malware alert symbol on a screen, set against a background filled with lines of computer code and network diagrams in shades of blue and pink. The word "MALWARE" prominently displayed within the alert symbol.](https://unit42.paloaltonetworks.com/wp-content/uploads/2024/07/07_Malware_Category_1920x900-786x368.jpg)
![Person in a blurred motion is working on a computer with screen showing lines of code, emphasizing a dynamic and intense focus on software development or programming in a dimly lit room.](https://unit42.paloaltonetworks.com/wp-content/uploads/2024/06/06_Malware_Category_1920x900-786x368.jpg)
![The image depicts a close-up view of a circuit board featuring microchips and electronic components with bright red digital data streams emanating from the surface, symbolizing high-speed data processing and technology innovation.](https://unit42.paloaltonetworks.com/wp-content/uploads/2024/06/04_Malware_Category_1920x900-786x368.jpg)
![A digital image depicting a skull formed by binary code, composed of ones and zeros, in shades of blue against a black background. The binary numbers appear to float and overlay each other, creating a visually striking and thematic technological motif.](https://unit42.paloaltonetworks.com/wp-content/uploads/2024/06/01_Malware_Category_1920x900-786x368.jpg)
![A laptop on a desk displaying a vibrant graphical interface with a circular red pattern, possibly representing cybersecurity or data analysis. The laptop is illuminated by the screen’s glow in a dimly lit room, which also shows a blurred background suggesting a secondary monitor and small desk objects.](https://unit42.paloaltonetworks.com/wp-content/uploads/2024/06/03_Malware_Category_1920x900-786x368.jpg)
![A digital illustration of a world map focused on Europe and parts of Asia, highlighted with glowing connections and nodes representing global connectivity.](https://unit42.paloaltonetworks.com/wp-content/uploads/2024/06/07_Nation-State-cyberattacks_1920x900-786x368.jpg)