For this week’s episode of 0verture: The Prelude Podcast Kris, Lewis, and Sam have a discussion about some of the research Prelude has been conducting more recently around looking at tools within the industry and what they do well and what things they may not do so well. Specifically, we have been looking at open and closed source tools around command and control and automated security software. Of course, we go down some rabbit holes as well and talk about a few other related things along the way.
Starting this year, we are going to 2 podcasts a month!
This podcast will be distributed on all major podcasting platforms including Spotify, Apple Podcasts, our blog at feed.prelude.org, and YouTube.
Please subscribe and reach out with any feedback. We love to hear from our community!
There are several ways to follow us and learn more about Prelude and our team members:
Get our products
Download Prelude Operator: https://www.prelude.org/download
See the latest kill chain and TTP Releases: https://chains.prelude.org/
See our open-source repositories: https://github.com/preludeorg
Join our community
Discord: https://discord.gg/gzUv4XNquu
Reddit: https://www.reddit.com/r/preludeorg/
Twitter: https://twitter.com/preludeorg
Read, watch, and listen
Listen to our Podcast: https://anchor.fm/preludeorg
Read our blog: https://feed.prelude.org
Watch our live streams: https://www.twitch.tv/preludeorg
Watch our pre-recorded content: https://www.youtube.com/c/preludeorg
Follow our team
David: https://twitter.com/privateducky
Alex: https://twitter.com/khyberspache
Kris: https://twitter.com/Xanthonus
Octavia: https://twitter.com/VV_X_7
Sam: https://twitter.com/wasupwithuman
0verture: The Prelude Podcast CVE-EP15