Out of the Woods: The Threat Hunting Podcast
Out of the Woods: The Threat Hunting Podcast

Out of the Woods: The Threat Hunting Podcast

Out of the Woods: The Threat Hunting Podcast

Overview
Episodes

Details

Intel 471's podcast with a twist! Join us for the first fully interactive threat hunting podcast where you can hang out with threat hunters from all over the world! Join a rag-tag bunch of threat hunters as they come out of the woods to explore some of the most burning issues related to cyber security. The Out of the Woods podcast is a casual talk covering the topics of threat hunting, security research, and threat intelligence, and some ranting and raving along the way, all over a cocktail or two! The Out of the Woods cyber security podcast is filmed in front of a live studio audience, and by that we mean YOU! We're inviting folks to join us once a month for a LIVE evening of great technical discussions, where you can ask questions and give your opinion in real time on a variety of discussions about threat hunting, security research, blue teaming, and wherever else the evening takes us!

Recent Episodes

S3 Ep60: Honey, I sideloaded Havoc...
MAR 5, 2026
S3 Ep60: Honey, I sideloaded Havoc...
<div> <p><strong>*[LIVE] Out of the Woods Podcast: Guess Who: The Malware Edition<br></strong>March 25, 2026 | 12:00 - 1:30 PM ET<br>Sign Up: <a href="https://www.intel471.com/resources/podcasts/guess-who-the-malware-edition-1">https://www.intel471.com/resources/podcasts/guess-who-the-malware-edition-1</a></p><p><strong>*Threat Hunting Management Workshop: Rethinking Priority<br></strong>March 18, 2026 | 12:00 - 12:30 PM ET<br>Sign Up: <a href="https://www.intel471.com/resources/webinars/threat-hunting-management-workshop-rethinking-priority">https://www.intel471.com/resources/webinars/threat-hunting-management-workshop-rethinking-priority</a></p><p>----------</p></div><h1><strong>Top Headlines:</strong></h1><div><br></div><ul> <li> <strong>Arctic Wolf</strong> | SloppyLemming Deploys BurrowShell and Rust-Based RAT to Target Pakistan and Bangladesh: <a href="https://arcticwolf.com/resources/blog/sloppylemming-deploys-burrowshell-and-rust-based-rat-to-target-pakistan-and-bangladesh/">https://arcticwolf.com/resources/blog/sloppylemming-deploys-burrowshell-and-rust-based-rat-to-target-pakistan-and-bangladesh/</a> </li> <li> <strong>Huntress</strong> | Fake Tech Support Delivers Havoc Command &amp; Control: <a href="https://www.huntress.com/blog/fake-tech-support-havoc-command-control">https://www.huntress.com/blog/fake-tech-support-havoc-command-control</a> </li> <li> <strong>Socket</strong> | StegaBin: 26 Malicious npm Packages Use Pastebin Steganography to Deploy Multi-Stage Credential Stealer: <a href="https://socket.dev/blog/stegabin-26-malicious-npm-packages-use-pastebin-steganography">https://socket.dev/blog/stegabin-26-malicious-npm-packages-use-pastebin-steganography</a> </li> <li> <strong>ThreatLabz</strong> | APT37 Adds New Tools For Air-Gapped Networks: <a href="https://www.zscaler.com/blogs/security-research/apt37-adds-new-capabilities-air-gapped-networks?&amp;web_view=true#technical-analysis">https://www.zscaler.com/blogs/security-research/apt37-adds-new-capabilities-air-gapped-networks?&amp;web_view=true#technical-analysis</a> </li> </ul><div> <p><br>----------</p><p><strong>Stay in Touch!</strong><br>Twitter: <a href="https://twitter.com/Intel471Inc">https://twitter.com/Intel471Inc</a><br>LinkedIn: <a href="https://www.linkedin.com/company/intel-471/">https://www.linkedin.com/company/intel-471/</a><br>YouTube: <a href="https://www.youtube.com/channel/UCIL4ElcM6oLd3n36hM4_wkg">https://www.youtube.com/channel/UCIL4ElcM6oLd3n36hM4_wkg</a><br>Discord: <a href="https://discord.gg/DR4mcW4zBr">https://discord.gg/DR4mcW4zBr</a><br>Facebook: <a href="https://www.facebook.com/Intel471Inc/">https://www.facebook.com/Intel471Inc/<br></a><br></p></div>
play-circle icon
47 MIN
S3 Ep59: Raiders of the Lost Macro
FEB 27, 2026
S3 Ep59: Raiders of the Lost Macro
<div><strong>Top Headlines:</strong></div><ul> <li> <strong>Group-IB</strong> | Operation Olalampo<strong>:</strong> Inside MuddyWater’s Latest Campaign: <a href="https://www.group-ib.com/blog/muddywater-operation-olalampo/">https://www.group-ib.com/blog/muddywater-operation-olalampo/</a> </li> <li> <strong>Point Wild </strong>| Remcos Revisited: Inside the RAT’s Evolving Command-and-Control Techniques: <a href="https://www.pointwild.com/threat-intelligence/remcos-revisited-inside-the-rats-evolving-command-and-control-techniques/">https://www.pointwild.com/threat-intelligence/remcos-revisited-inside-the-rats-evolving-command-and-control-techniques/</a> </li> <li> <strong>Lab 52 </strong>| Operation MacroMaze: new APT28 campaign using basic tooling and legit infrastructure: <a href="https://lab52.io/blog/operation-macromaze-new-apt28-campaign-using-basic-tooling-and-legit-infrastructure/">https://lab52.io/blog/operation-macromaze-new-apt28-campaign-using-basic-tooling-and-legit-infrastructure/</a> </li> <li> <strong><a href="http://therecord.media">therecord.media</a></strong> | Researchers warn Volt Typhoon still embedded in US utilities and some breaches may never be found: <a href="https://therecord.media/researchers-warn-volt-typhoon-still-active-critical-infrastructure?&amp;web_view=true">https://therecord.media/researchers-warn-volt-typhoon-still-active-critical-infrastructure?&amp;web_view=true</a> </li> </ul><div> <p><br>----------</p><p><strong>Stay in Touch!</strong><br>Twitter: <a href="https://twitter.com/Intel471Inc">https://twitter.com/Intel471Inc</a><br>LinkedIn: <a href="https://www.linkedin.com/company/intel-471/">https://www.linkedin.com/company/intel-471/</a><br>YouTube: <a href="https://www.youtube.com/channel/UCIL4ElcM6oLd3n36hM4_wkg">https://www.youtube.com/channel/UCIL4ElcM6oLd3n36hM4_wkg</a><br>Discord: <a href="https://discord.gg/DR4mcW4zBr">https://discord.gg/DR4mcW4zBr</a><br>Facebook: <a href="https://www.facebook.com/Intel471Inc/">https://www.facebook.com/Intel471Inc/</a></p></div>
play-circle icon
62 MIN
S3 Ep58: Keep the Classics, Cue the Chaos
FEB 19, 2026
S3 Ep58: Keep the Classics, Cue the Chaos
<div> <strong>Top Headlines:<br></strong><br></div><ul> <li> <strong>The Hacker News</strong> | Microsoft Discloses DNS-Based ClickFix Attack Using Nslookup for Malware Staging: <a href="https://thehackernews.com/2026/02/microsoft-discloses-dns-based-clickfix.html?m=1">https://thehackernews.com/2026/02/microsoft-discloses-dns-based-clickfix.html?m=1</a> </li> <li> <strong>Straiker</strong> | SmartLoader Clones Oura Ring MCP to Deploy Supply Chain Attack: <a href="https://www.straiker.ai/blog/smartloader-clones-oura-ring-mcp-to-deploy-supply-chain-attack">https://www.straiker.ai/blog/smartloader-clones-oura-ring-mcp-to-deploy-supply-chain-attack</a> </li> <li> <strong>InfoStealers</strong> | Hudson Rock Identifies Real-World Infostealer Infection Targeting OpenClaw Configurations: <a href="https://www.infostealers.com/article/hudson-rock-identifies-real-world-infostealer-infection-targeting-openclaw-configurations/">https://www.infostealers.com/article/hudson-rock-identifies-real-world-infostealer-infection-targeting-openclaw-configurations/</a> </li> <li> <strong>Forcepoint</strong> | ScreenConnect Under Attack: SmartScreen Evasion and RMM Abuse: <a href="https://www.forcepoint.com/blog/x-labs/screenconnect-attack">https://www.forcepoint.com/blog/x-labs/screenconnect-attack</a> </li> </ul><div> <p><br>----------</p><p><strong>Stay in Touch!</strong><br>Twitter: <a href="https://twitter.com/Intel471Inc">https://twitter.com/Intel471Inc</a><br>LinkedIn: <a href="https://www.linkedin.com/company/intel-471/">https://www.linkedin.com/company/intel-471/</a><br>YouTube: <a href="https://www.youtube.com/channel/UCIL4ElcM6oLd3n36hM4_wkg">https://www.youtube.com/channel/UCIL4ElcM6oLd3n36hM4_wkg</a><br>Discord: <a href="https://discord.gg/DR4mcW4zBr">https://discord.gg/DR4mcW4zBr</a><br>Facebook: <a href="https://www.facebook.com/Intel471Inc/">https://www.facebook.com/Intel471Inc/<br></a><br></p></div>
play-circle icon
46 MIN
S3 Ep57: If you speak it, they will come...
FEB 12, 2026
S3 Ep57: If you speak it, they will come...
<div> <p><strong>*On-Demand - Threat Hunting Workshop: Hunting for Privilege Escalation - Level 2</strong><br>Watch Now: <a href="https://www.intel471.com/resources/webinars/threat-hunting-workshop-hunting-for-privilege-escalation-level-2">https://www.intel471.com/resources/webinars/threat-hunting-workshop-hunting-for-privilege-escalation-level-2<br></a><br>----------</p><p><strong>Top Headlines:<br></strong><br></p></div><ul> <li> <strong>Socket</strong> | Malicious dYdX Packages Published to npm and PyPI After Maintainer Compromise: <a href="https://socket.dev/blog/malicious-dydx-packages-published-to-npm-and-pypi">https://socket.dev/blog/malicious-dydx-packages-published-to-npm-and-pypi</a> </li> <li> <strong>Help Net Security </strong>| State-backed phishing attacks targeting military officials and journalists on Signal: <a href="https://www.helpnetsecurity.com/2026/02/06/state-linked-phishing-europe-journalists-signal/?web_view=true">https://www.helpnetsecurity.com/2026/02/06/state-linked-phishing-europe-journalists-signal/?web_view=true</a> </li> <li> <strong>Cisco Talos</strong> | Knife Cutting the Edge: Disclosing a China-nexus gateway-monitoring AitM framework: <a href="https://blog.talosintelligence.com/knife-cutting">https://blog.talosintelligence.com/knife-cutting</a> </li> <li> <strong>Huntress</strong> | They Got In Through SonicWall. Then They Tried to Kill Every Security Tool: <a href="https://www.huntress.com/blog/encase-byovd-edr-killer">https://www.huntress.com/blog/encase-byovd-edr-killer</a> </li> </ul><div> <p><br>----------</p><p><strong>Stay in Touch!</strong><br>Twitter: <a href="https://twitter.com/Intel471Inc">https://twitter.com/Intel471Inc</a><br>LinkedIn: <a href="https://www.linkedin.com/company/intel-471/">https://www.linkedin.com/company/intel-471/</a><br>YouTube: <a href="https://www.youtube.com/channel/UCIL4ElcM6oLd3n36hM4_wkg">https://www.youtube.com/channel/UCIL4ElcM6oLd3n36hM4_wkg</a><br>Discord: <a href="https://discord.gg/DR4mcW4zBr">https://discord.gg/DR4mcW4zBr</a><br>Facebook: <a href="https://www.facebook.com/Intel471Inc/">https://www.facebook.com/Intel471Inc/</a></p></div>
play-circle icon
49 MIN