Skip Navigation
Get a Demo
 
 
 
 
 
 
 
 
 
Resources Blog Security operations

Here's what you missed on Office Hours: September 2025

Here's what you missed on Office Hours: September 2025

Phishing campaigns dropping RMM tools, WordPress sites delivering malware, and detection guidance for all of it: Catch up on the last month’s episodes of Red Canary Office Hours.

Originally published . Last modified .

Every Tuesday at 1 PM ET, Red Canary Co-founder Keith McCammon and CISO Dave Farrow tackle cybersecurity news and industry trends with special guests and exclusive operational insights.

September’s episodes touched on new phishing tactics, npm package compromises, malicious traffic distributors and more. We’ve embedded them all here for your viewing pleasure.

Episode 31: Phishing and email security

Dave is joined by Jake Davidson (Senior Product Manager), Jim Irwin (Manager of Detection Engineering), and Matthew Dean (Phishing Analyst) to discuss email security operations. They explore what we’re observing at Red Canary and examine customer-reported phishing trends.

 

Episode 32: AMA with Brian Donohue

Office Hours regular Brian Donohue joins Keith as they tackle audience questions ranging from the recent uptick in npm compromises to the state of the cybersecurity job market.

 

Episode 33: The most effective security controls

Keith and Dave are joined by Matt Berninger, SVP at Marsh McLennan and leader within their Cyber Risk Intelligence Center (CRIC). Matt shares what they’ve learned about cybersecurity control efficacy from an insurer’s perspective and the controls they’ve found to correlate with improved cybersecurity outcomes (which you should read as “fewer breaches”).

Episode 34: September Intelligence Insights

Senior Intelligence Analyst Stef Rand breaks down the top 10 threat list from September’s Intelligence Insights, focusing on KongTuke, a traffic distribution system (TDS) that made its debut in the no. 1 slot. Keith and Dave then weigh in with a discussion about risk tolerance and whether the browser is truly the endpoint that matters most.

 

 

Go jump in a lake: Data storage for the win

 

Go jump in a lake: Measuring the data lake effect on your SIEM

 

Red Canary CFP tracker: January 2026

 

Here’s what you missed on Office Hours: December 2025

Subscribe to our blog

Security gaps? We got you.

Sign up for our monthly email newsletter for expert insights on MDR, threat intel, and security ops—straight to your inbox.


 
 
Back to Top