Microsoft Defender is often treated as “good enough” security—built in, always on, and quietly doing its job. But what happens when malware convinces Windows to turn it off without triggering alarms?
In this episode, cybersecurity expert Tyler Mofitt breaks down a real-world Windows malware campaign that disables Defender before anything else happens. No zero-days. No flashy exploits. Just a quiet abuse of built-in trust that causes Windows to step aside its own protection.
He walks through how shortcut files, PowerShell, and legitimate cloud services are used to blend into normal activity, why Defender doesn’t fail so much as follow the rules, and what defenders should be watching for when “installed” doesn’t always mean “active.”
A conversation about assumptions, visibility, and why the most dangerous attacks don’t look dangerous at all.
Link mentioned in the episode - threat intel hub with all the latest trends and stories going on with threat intelligence.
https://community.opentextcybersecurity.com/
As featured on Million Podcasts'
Best 100 Cybersecurity Podcasts
Top 50 Chief Information Security Officer CISO Podcasts
Top 70 Security Hacking Podcasts
This list is the most comprehensive ranking of Cyber Security Podcasts online and we are honoured to feature amongst the best!
Follow or subscribe to the show on your preferred podcast platform.
Share the show with others in the cybersecurity world.
Get in touch via
[email protected]