389 Episodo

  1. An abuse of trust: Potential security issues with open redirects.

    Publicado: 5/3/2022
  2. Noberus ransomware: Coded in Rust and tailored to victim.

    Publicado: 26/2/2022
  3. Instagram hijacks all start with a phish.

    Publicado: 19/2/2022
  4. SysJoker backdoor masquerades as benign updates.

    Publicado: 12/2/2022
  5. The persistent and patient nature of advanced threat actors.

    Publicado: 5/2/2022
  6. Use of legitimate tools possibly linked to Seedworm.

    Publicado: 29/1/2022
  7. A collaboration stumbles upon threat actor Lyceum.

    Publicado: 22/1/2022
  8. Keeping APIs on the radar: Evaluating the banking industry.

    Publicado: 15/1/2022
  9. The rise of Karakurt Hacking Team.

    Publicado: 8/1/2022
  10. Encore: When big ransomware goes away, where should affiliates go?

    Publicado: 1/1/2022
  11. CyberWire Pro Research Briefing from 12/21/2021.

    Publicado: 25/12/2021
  12. Discovering ChaosDB, a critical vulnerability in the CosmosDB.

    Publicado: 18/12/2021
  13. FIN7 repositioning focus into ransomware.

    Publicado: 11/12/2021
  14. Getting in and getting out with SnapMC.

    Publicado: 4/12/2021
  15. CyberWire Pro Research Briefing from 11/23/2021

    Publicado: 27/11/2021
  16. Using bidirectionality override characters to obscure code.

    Publicado: 20/11/2021
  17. A glimpse into TeamTNT.

    Publicado: 13/11/2021
  18. An incident response reveals itself as GhostShell tool, ShellClient.

    Publicado: 6/11/2021
  19. Malware sometimes changes its behavior.

    Publicado: 30/10/2021
  20. When big ransomware goes away, where should affiliates go?

    Publicado: 23/10/2021

9 / 20

Every Saturday, we sit down with cybersecurity researchers to talk shop about the latest threats, vulnerabilities, and technical discoveries.

Visit the podcast's native language site