{"version":1,"type":"rich","provider_name":"Libsyn","provider_url":"https:\/\/www.libsyn.com","height":300,"width":600,"title":"Deepfakes &amp; Laptop Farms: How Nation-States Infiltrate the Defense Supply Chain with Luke McNamara","description":" Cyber threats against the Defense Industrial Base (DIB) don\u2019t stop at the battlefield\u2014they extend into suppliers, perimeter devices, and even hiring pipelines. Luke McNamara of Google\u2019s Threat Intelligence Group joins Frank Cilluffo to unpack Mandiant\u2019s report Beyond the Battlefield: Threats to the Defense Intelligence Base and the patterns it flags across today\u2019s threat landscape. They discuss how the war in Ukraine is shaping targeting priorities, why China\u2019s cyber espionage increasingly begins at the network edge, and how \u201cfast follower\u201d exploit cycles compress patch timelines. McNamara also explains the North Korean IT worker problem, where remote hiring fraud can create both revenue and potential access pathways. The takeaway for mid-sized defense suppliers is practical: harden identity, reduce perimeter exposure, and assume meaningful risk often starts outside traditional corporate visibility.  Main Topics Covered   Why manufacturing remains a top target and a warning sign for broader supply-chain risk  How the war in Ukraine is influencing cyber targeting tied to drones and UAS ecosystems  China\u2019s focus on edge-device compromise (VPNs, routers, email gateways) and why it matters  The \u201cfast follower\u201d dynamic that turns one vulnerability into many intrusions  North Korean IT worker operations, remote hiring fraud, and AI-enabled deception  The highest-leverage defensive priorities for DIB organizations, especially identity and MFA  Key Quotes \u201cManufacturing is always the most targeted sector going back to 2020. And I think that\u2019s a larger canary in the coal mine.\u201d \u00ad\u00ad\u2014 Luke McNamara \u201cIt\u2019s not just some of these top-tier Chinese APT actors and their ability to leverage these as a zero-day, but the ability for secondary groups, once some of the details leak around a particular vulnerability, to start weaponizing it themselves.\u201d \u2014 Luke McNamara \u201cIf I had to narrow it down to one category to put more resources to, I would say identity\u2026hardening around the identity piece is certainly key.\u201d \u2014 Luke McNamara &quot;Organizations that are more aware of [the North Korean IT worker infiltration], where the security teams have met with their HR folks, their recruiters, helped inform them about the nature of these threats, I think they're a little bit better secured.&quot; \u2014 Luke McNamara &quot;It sounds more like a movie than reality, but it's happening.&quot; \u2014 Frank Cilluffo Relevant Links and Resources Mandiant report \u2014&amp;nbsp;Beyond the Battlefield: Threats to the Defense Intelligence Base  Mandiant podcast \u2014&amp;nbsp;Defenders Advantage  Guest Bio Luke McNamara is a Deputy Chief Analyst at Google Cloud\u2019s Mandiant Intelligence and part of Google\u2019s Threat Intelligence Group, focused on cyber threat trends and emerging risks. ","author_name":"Cyber Focus: Cybersecurity, National Security, and Critical Infrastructure","author_url":"https:\/\/mccraryinstitute.com\/podcast\/","html":"<iframe title=\"Libsyn Player\" style=\"border: none\" src=\"\/\/html5-player.libsyn.com\/embed\/episode\/id\/40215155\/height\/300\/theme\/custom\/thumbnail\/yes\/direction\/forward\/render-playlist\/no\/custom-color\/88AA3C\/\" height=\"300\" width=\"600\" scrolling=\"no\"  allowfullscreen webkitallowfullscreen mozallowfullscreen oallowfullscreen msallowfullscreen><\/iframe>","thumbnail_url":"https:\/\/assets.libsyn.com\/secure\/content\/198921860"}