389 Episodo

  1. Breaking barriers, one byte at a time.

    Publicado: 29/3/2025
  2. Excel-lerating cyberattacks.

    Publicado: 22/3/2025
  3. The ransomware clones of HellCat & Morpheus.

    Publicado: 15/3/2025
  4. Botnet’s back, tell a friend.

    Publicado: 8/3/2025
  5. Caught in the contagious interview.

    Publicado: 1/3/2025
  6. From small-time scams to billion-dollar threats.

    Publicado: 22/2/2025
  7. Bot or not? The fake CAPTCHA trick spreading Lumma malware.

    Publicado: 15/2/2025
  8. Cleo’s trojan horse.

    Publicado: 8/2/2025
  9. A Digital Eye on supply-chain-based espionage attacks.

    Publicado: 1/2/2025
  10. LightSpy's dark evolution.

    Publicado: 25/1/2025
  11. A cute cover for a dangerous vulnerability.

    Publicado: 18/1/2025
  12. The hidden cost of data hoarding.

    Publicado: 11/1/2025
  13. Crypto client or cyber trap?

    Publicado: 4/1/2025
  14. On the prowl for mobile malware.

    Publicado: 28/12/2024
  15. Quishing for trouble.

    Publicado: 21/12/2024
  16. Watching the watchers. IoT vulnerabilities exposed by AI.

    Publicado: 14/12/2024
  17. The JPHP loader breaking away from the pack.

    Publicado: 7/12/2024
  18. Leaking your AWS API keys, on purpose?

    Publicado: 30/11/2024
  19. Exposing AI's Achilles heel.

    Publicado: 23/11/2024
  20. Credential harvesters in the cloud.

    Publicado: 16/11/2024

1 / 20

Every Saturday, we sit down with cybersecurity researchers to talk shop about the latest threats, vulnerabilities, and technical discoveries.

Visit the podcast's native language site