389 Episodo

  1. EtterSilent: a popular, versatile maldoc builder.

    Publicado: 29/5/2021
  2. Leveraging COVID-19 themes for malicious purposes.

    Publicado: 22/5/2021
  3. Jack Voltaic: critical infrastructure resiliency project, not a person.

    Publicado: 15/5/2021
  4. SUPERNOVA activity and its possible connection to SPIRAL threat group.

    Publicado: 8/5/2021
  5. A snapshot of the ransomware threat landscape.

    Publicado: 1/5/2021
  6. Bulletproof hosting (BPH) and how it powers cybercrime.

    Publicado: 24/4/2021
  7. Social engineering: MINEBRIDGE RAT embedded to look like job résumés.

    Publicado: 17/4/2021
  8. Strategic titles point to something more than a commodity campaign.

    Publicado: 10/4/2021
  9. Ezuri: Regenerating a different kind of target.

    Publicado: 3/4/2021
  10. How are we doing in the industrial sector?

    Publicado: 27/3/2021
  11. BendyBear: difficult to detect and downloader of malicious payloads.

    Publicado: 20/3/2021
  12. Keeping data confidential with fully homomorphic encryption.

    Publicado: 13/3/2021
  13. Diving deep into North Korea's APT37 tool kit.

    Publicado: 6/3/2021
  14. Shining a light on China's cyber underground.

    Publicado: 27/2/2021
  15. Attackers (ab)using Google Chrome.

    Publicado: 20/2/2021
  16. Using the human body as a wire-like communication channel.

    Publicado: 13/2/2021
  17. "Follow the money" the cybersecurity way.

    Publicado: 6/2/2021
  18. The Kimsuky group from North Korea expands spyware, malware and infrastructure.

    Publicado: 30/1/2021
  19. Trickbot may be down, but can we count it out?

    Publicado: 23/1/2021
  20. Manufacturing sector is increasingly a target for adversaries.

    Publicado: 16/1/2021

11 / 20

Every Saturday, we sit down with cybersecurity researchers to talk shop about the latest threats, vulnerabilities, and technical discoveries.

Visit the podcast's native language site