Josh Shepard

Josh Shepard

Josh has spent his career hunting for and neutralizing nation-state threat actors targeting critical infrastructure. During his time with the USAF, he led a team of threat hunters pursuing advanced persistent threats (APTs) targeting the defense industrial base, energy, transportation, and water/wastewater sectors. From there he transitioned to Ro, a startup in the healthcare sector, where he built and led a threat intelligence and threat hunt program operating on a multi-cloud, multi-operating system environment.

Posts by Josh Shepard

Threat Hunters Corner: Understanding T1543 - Create or Modify System Processes

Welcome Hey everyone, Josh Shepard here, Principal Threat Hunter at RADICL. Welcome to the inaugural edition of the Thre …

Read Story

3 min read
2024 | 10

Snitches Get Stitches – Mitre ATT&CK for Insider Threat Detection

The Problem Insider threat detection is tough, especially when dealing with an insider who knows what they are doing. Th …

Read Story

1 min read
2024 | 08

Sharing is Caring – Novel SharePoint Phishing Campaign

Summary RADICL recently observed a sophisticated phishing campaign designed to steal O365 login credentials. This campai …

Read Story

3 min read
2024 | 07

I Spy a Ransomware Attack

The Situation: A recent joint report published by Recorded Future, SentinelOne, and TeamT5 revealed that several Chinese …

Read Story

2 min read
2024 | 07

Pyramid of Pain - You Can't Tie Your Shoes That Way

The Pyramid of What?? The Pyramid of Pain is a conceptual model created by David Bianco in 2013 that helps detection eng …

Read Story

3 min read
2024 | 07

Big Brother Hacker - Attack Reconnaissance

Summary Have you ever wondered how a hacker finds that vulnerable server to exploit or gets a list of viable email addre …

Read Story

5 min read
2024 | 06

Navigating Skynet with MITRE ATLAS

Summary With the rapid improvements in AI, many companies are moving quickly to integrate it into new or existing techno …

Read Story

2 min read
2024 | 05

Master of Disguise 2: The Art of ReDirection

Summary At RADICL, we’ve recently seen an uptick in threat actors using open redirect vulnerabilities in legitimate webs …

Read Story

2 min read
2024 | 05

Master of Disguise: URL Edition

Bottom Line Up Front Threat actors are crafty when it comes to social engineering. They will do anything in their power …

Read Story

5 min read
2024 | 04
3 min read
2024 | 03
RADlabs logo
Perspectives, insights, and education from our founders and vSOC team.

Subscribe the the RADICL Labs Blog: