Josh Shepard

Josh Shepard

Josh has spent his career hunting for and neutralizing nation-state threat actors targeting critical infrastructure. During his time with the USAF, he led a team of threat hunters pursuing advanced persistent threats (APTs) targeting the defense industrial base, energy, transportation, and water/wastewater sectors. From there he transitioned to Ro, a startup in the healthcare sector, where he built and led a threat intelligence and threat hunt program operating on a multi-cloud, multi-operating system environment.

Posts by Josh Shepard

Threat Hunter’s Corner: Smuggling with HTML

Welcome Welcome back to the Threat Hunters Corner! I’m Josh Shepard, Principal Threat Hunter at Radical, and in this epi …

Read Story

2 min read
2024 | 12

Phishing with Fabric - A “Universal Workspace”

Summary RADICL recently observed a phishing campaign that leverages tried and true techniques but this time with a new c …

Read Story

2 min read
2024 | 11

Threat Hunter’s Corner: Tracking Lumma Stealer

Welcome Welcome back to the Threat Hunters Corner! I’m Josh Shepard, Principal Threat Hunter at Radical, and in this epi …

Read Story

2 min read
2024 | 11

Threat Hunters Corner: Network TTP Hunting with EDR Data

Welcome Welcome back to the Threat Hunters Corner! I’m Josh Shepard, principal threat hunter at Radical, and in this sec …

Read Story

2 min read
2024 | 10

Threat Hunters Corner: Understanding T1543 - Create or Modify System Processes

Welcome Hey everyone, Josh Shepard here, Principal Threat Hunter at RADICL. Welcome to the inaugural edition of the Thre …

Read Story

3 min read
2024 | 10

Snitches Get Stitches – Mitre ATT&CK for Insider Threat Detection

The Problem Insider threat detection is tough, especially when dealing with an insider who knows what they are doing. Th …

Read Story

1 min read
2024 | 08

Sharing is Caring – Novel SharePoint Phishing Campaign

Summary RADICL recently observed a sophisticated phishing campaign designed to steal O365 login credentials. This campai …

Read Story

3 min read
2024 | 07

I Spy a Ransomware Attack

The Situation: A recent joint report published by Recorded Future, SentinelOne, and TeamT5 revealed that several Chinese …

Read Story

2 min read
2024 | 07

Pyramid of Pain - You Can't Tie Your Shoes That Way

The Pyramid of What?? The Pyramid of Pain is a conceptual model created by David Bianco in 2013 that helps detection eng …

Read Story

3 min read
2024 | 07

Big Brother Hacker - Attack Reconnaissance

Summary Have you ever wondered how a hacker finds that vulnerable server to exploit or gets a list of viable email addre …

Read Story

5 min read
2024 | 06
RADlabs logo
Perspectives, insights, and education from our founders and vSOC team.

Subscribe the the RADICL Labs Blog: