Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Cyber Threat Hunting Podcasts

show episodes
 
ConversingLabs Podcast brings you conversations with the best and brightest minds in malware analysis, threat hunting, incident response and software assurance. Hosted by Paul Roberts, Cyber Content Lead at ReversingLabs, ConversingLabs digs into cutting edge topics that are most pressing in the world of cybersecurity.
  continue reading
 
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. ​ We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
  continue reading
 
Artwork

1
Out of the Woods: The Threat Hunting Podcast

Out of the Woods: The Threat Hunting Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Intel 471's podcast with a twist! Join us for the first fully interactive threat hunting podcast where you can hang out with threat hunters from all over the world! Join a rag-tag bunch of threat hunters as they come out of the woods to explore some of the most burning issues related to cyber security. The Out of the Woods podcast is a casual talk covering the topics of threat hunting, security research, and threat intelligence, and some ranting and raving along the way, all over a cocktail ...
  continue reading
 
Cyber security is dynamic and fast changing. Keep up-to-date with the latest news, vulnerabilities, threats and new research. For latest cyber security blogs, visit https://rasoolirfan.com and tweet @ → twitter.com/rasoolirfan
  continue reading
 
Artwork

1
The Cyber Riddler

Ahmad Almorabea

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Cyber Riddler is a podcast that discusses interesting topics in the field of information security. It explores different areas and situations in real-life cyber security engagements and activities. Episodes feature guests from different backgrounds such as hackers, security analysts, cyber security managers, bug bounty hobbyists and more.
  continue reading
 
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Threat Intelligence Analyst Kim Bromley brings over 15 years of experience in threat intelligence across the public and private sectors. Kim and her guests provide practical perspectives on the week’s top cybersecurity news and share knowledg ...
  continue reading
 
Each webinar features an SEI researcher discussing their research on software and cybersecurity problems of considerable complexity. The webinar series is a way for the SEI to accomplish its core purpose of improving the state-of-the-art in software engineering and cybersecurity and transitioning this work to the community. The SEI is a federally funded research and development center sponsored by the U.S. Department of Defense and operated by Carnegie Mellon University. The SEI Webinar Seri ...
  continue reading
 
Artwork

1
The Naked Scientists Podcast

The Naked Scientists

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
The Naked Scientists flagship science show brings you a lighthearted look at the latest scientific breakthroughs, interviews with the world's top scientists, answers to your science questions and science experiments to try at home.
  continue reading
 
Since 2005, BlueHat has been where the security research community, and Microsoft, come together as peers; to debate, discuss, share, challenge, celebrate and learn. On The BlueHat Podcast, Microsoft and MSRC’s Nic Fillingham and Wendy Zenone will host conversations with researchers and industry leaders, both inside and outside of Microsoft, working to secure the planet’s technology and create a safer world for all.
  continue reading
 
Artwork

1
SpyCast

SpyCast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
SpyCast, the official podcast of the International Spy Museum, is a journey into the shadows of international espionage. Each week, host Sasha Ingber brings you the latest insights and intriguing tales from spies, secret agents, and covert communicators, with a focus on how this secret world reaches us all in our everyday lives. Tune in to discover the critical role intelligence has played throughout history and today. Brought to you from Airwave, Goat Rodeo, and the International Spy Museum ...
  continue reading
 
Artwork

1
Guardians Of Innocence

Guardians Of Innocence

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Guardians of Innocence is a powerful and informative podcast designed to equip parents, teachers, and communities with the knowledge and tools needed to protect children from the growing threat of trafficking. Each episode dives deep into the tactics traffickers use to target vulnerable children—both online and in real life—and provides actionable advice on how to recognize the warning signs. Through expert interviews with cyber safety professionals, law enforcement, and survivors, we uncove ...
  continue reading
 
Artwork

1
Forged In Security

Andrew Hoffritz

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
It’s easy to get lost in the space that is cybersecurity which encompasses dozens of specialty areas that can be further segmented into more than 50 career roles. Andrew Hoffritz, a cybersecurity enthusiast and professional, interviews a diverse selection of cybersecurity-minded professionals worldwide each month and pulls back the curtain on how to break into the cybersecurity field, discussing unique skills and why cybersecurity is a continuously growing field. Each episode contains powerf ...
  continue reading
 
Welcome to Behind the Binary, the podcast that introduces you to the fascinating people, technology, and tools driving the world of reverse engineering. Join your host, Josh Stroschein, a reverse engineer with the FLARE team at Google, and someone passionate about sharing knowledge and shedding light on the art of reverse engineering, as he sits down with intriguing guests to explore the human side of this profession. Behind the Binary goes beyond the code, sharing the stories, motivations, ...
  continue reading
 
Loading …
show series
 
This week, our hosts⁠⁠⁠⁠⁠⁠⁠ ⁠Dave Bittner⁠, ⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠ Space Daily show) are back sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow-up from listener Abdussobur, who wonders if…
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with Intelligence Analyst Hayden and Threat Hunter Leo as they discuss: New Scattered Spider Attack Chain Israel and Iran Cyber Threat Deep Dive Top Iran-linked Threat Groups & How to Mitigate Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research…
  continue reading
 
Ever wonder who names the world's most notorious APTs? In this episode, we sit down with Greg Sinclair, a reverse engineer from the FLARE team at Google. Greg not only hunts down sophisticated malware but also shares the behind the scenes story of how he discovered and named the North Korean APT, the Lazarus Group. He also discusses his innovative …
  continue reading
 
In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone are joined by Mike Macelletti from Microsoft’s MSRC Vulnerabilities and Mitigations team to explore Redirection Guard, a powerful mitigation designed to tackle a long-standing class of file path redirection vulnerabilities in Windows. Mike shares how his interest in securi…
  continue reading
 
Emerging alongside Joseph McCarthy’s Red Scare in the 1950s was the Lavender Scare: Widespread panic and paranoia over the inclusion of gay personnel in the federal government. Their perceived dangers led to the terminations and forced resignations of thousands. Fast forward to 1988 – Tracey Ballard, who worked at the CIA, headed in to take a polyg…
  continue reading
 
Please enjoy this encore of Word Notes. Software libraries, frameworks, packages, and other components, and their dependencies (third-party code that each component uses) that have inherent security weaknesses, either through newly discovered vulnerabilities or because newer versions have superseded the deployed version. Audio reference Link: "⁠The…
  continue reading
 
In this edition of The Naked Scientists: HPV vaccination rates are waning. We examine the importance of the jab. Also ahead: why Africa is key to understanding the evolution of early humans. Plus, the reasons alcohol-free booze might actually not be all that good for us... Like this podcast? Please help us by supporting the Naked Scientists…
  continue reading
 
Please enjoy this encore of Hacking Humans. On Hacking Humans, ⁠Dave Bittner⁠, ⁠Joe Carrigan⁠, and ⁠Maria Varmazis⁠ (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there…
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analyst Joey and detection engineer Marken as they discuss: Anubis Ransomware Wiper Capability Teamfiltration Pentesting Tool Cyber Implications of Israel-Iran Conflict The Most Up to Date Attacker Trends Kim Bromley: Senior Cyber Threat Intelligence Analyst on …
  continue reading
 
*[LIVE] Out of the Woods: The Threat Hunting Podcast The Intersection of AI and Threat Hunting: What Problems Emerge, What Problems Get Solved July 10, 2025 | 12:00 - 1:30 PM ET Sign up: https://intel471.com/resources/podcasts/the-intersection-of-ai-and-threat-hunting-what-problems-emerge-what-problems-get-solved *Threat Hunting Management Workshop…
  continue reading
 
Organizations looking to build and adopt artificial intelligence (AI)–enabled systems face the challenge of identifying the right capabilities and tools to support Machine Learning Operations (MLOps) pipelines. Navigating the wide range of available tools can be especially difficult for organizations new to AI or those that have not yet deployed sy…
  continue reading
 
What should the US Intelligence Community prioritize domestically and overseas, and how should the work be done? We sat down with Congressman Rick Crawford, Chairman of the House Permanent Select Committee on Intelligence, to learn his perspective on these questions. The conversation emphasized the growing threat of China’s influence in the West, t…
  continue reading
 
In the final installment of this season of Titans of Science, Chris Smith speaks with Sharon Peacock, one of the UK's leading voices in infectious disease research. She is best known for her work on whole genome sequencing of pathogens such as MRSA and SARS CoV-2, and studies of antimicrobial resistance... Like this podcast? Please help us by suppo…
  continue reading
 
Think you can manage industrial systems like your IT infrastructure? Think again. In this episode of The Audit, Dino Busalachi unpacks the high-stakes complexity of OT-IT convergence—and why your trusty IT playbook flatlines on the plant floor. Join the IT Audit Labs crew as we dive into the chaos of managing 10,000+ industrial assets across a spra…
  continue reading
 
Cambridge University have informed us that, for cost cutting reasons, they intend to make Dr Chris Smith redundant. Naturally, this jeopardises the Naked Scientists programme, which is produced under his role. He will also lose his medical job. We regard this as a terrible decision and we intend to protest. Please listen to this short podcast to he…
  continue reading
 
In this edition of The Naked Scientists: the UK commits to building a new nuclear power station. But is it worth the hefty price tag? Also, how robots are revolutionising surgery. We'll ask what they can and can't do. And, how NASA's top scientists track rogue near-Earth objects with remarkable precision... Like this podcast? Please help us by supp…
  continue reading
 
This week, our hosts⁠⁠⁠⁠⁠ Dave Bittner, ⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start off with some more chicken follow up, this week, delving into malware-relat…
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analysts Alex and John as they discuss: The Enduring Legacy of Black Basta Qilin's Exploitation of Fortinet Flaws Vishing for Salesforce Data Atomic Stealer x ClickFix Campaign Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Resear…
  continue reading
 
In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone share Ram Shankar Siva Kumar’s dynamic keynote from BlueHat India 2025, where he explores the evolving threat landscape of AI through the lens of the Microsoft AI Red Team. From adversarial machine learning to psychosocial harms and persuasive AI, Ram highlights real-world…
  continue reading
 
In the early 2000s, the FBI uncovered a team of Russian operatives who had been living double lives in the United States. They were posing as professors, journalists, financial planners, real estate and travel agents, all while sending information back to Moscow. Now, 15 years after they were arrested, Alan Kohler, the former Assistant Director of …
  continue reading
 
The mental health of the young is reaching breaking point, globally. A recent analysis by a panel of leading researchers, young people, and policy experts, has warned that, without targeted action, by 2030, 42 million years of healthy life could be lost to mental illness or suicide; that's two million more than ten years ago. So today we're asking,…
  continue reading
 
In this edition of The Naked Scientists: African leaders hold emergency talks about deadly outbreaks of cholera on the continent. But why is this happening, and what can be done to curb the threat? The James Webb Space Telescope breaks another cosmic record spotting the oldest galaxy ever seen, dating from just 280 million years after the Big Bang.…
  continue reading
 
This week, our hosts⁠⁠⁠ ⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠, and ⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠T-Minus⁠⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow-up from a listener on class action settlements: they’re a class action attorney …
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analysts Joey and Alex as they discuss: Scattered Spider's Focus on Tech Vendors How APT41 Abuses Google Calendar for C2 The SentinelOne Outage A New Void Blizzard Espionage Campaign Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat …
  continue reading
 
What goes into creating effective software protections? This episode features a conversation with Tim Blazytko, Chief Scientist and Head of Engineering at Emproof, about the essential strategies for protecting software intellectual property. We cover the core concepts of code obfuscation and anti-reverse engineering and discuss practical, modern ap…
  continue reading
 
How do you catch an enemy’s submarine … and then make it vanish? That’s what the U.S. Navy’s elusive Tenth Fleet planned, as it tracked down Germany’s U-505 submarine. The mission came right before the Allies ran ashore on the beaches of Normandy in World War II. Historian Alexander Rose draws on long classified documents and intercepted transmissi…
  continue reading
 
Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is ⁠⁠Selena Larson⁠⁠, ⁠⁠Proofpoint⁠⁠ intelligence analyst and host of their podcast ⁠⁠DISCARDED⁠⁠. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is jo…
  continue reading
 
Today's programme is all about prostate cancer; exploring what the disease is, who gets it, and how it can be treated. We'll explore the game-changing test from a Cambridge based firm, and question whether sometimes the best approach is to leave the cancer alone... Like this podcast? Please help us by supporting the Naked Scientists…
  continue reading
 
What happens when you cross a Tamagotchi with a Wi-Fi hacking tool? You get the Pwnagotchi—a pocket-sized device that "feeds" on Wi-Fi handshakes and learns from its environment. In this episode, Jayden Traufler and Cameron Birkland join the crew to demonstrate how this deceptively cute device can passively capture encrypted Wi-Fi credentials from …
  continue reading
 
In this edition of The Naked Scientists: The UK announces a 1 billion pound budget for a cyber army: but what will these keyboard warriors be doing? Also, a vaccine for norovirus that is just one pill. And, physicists at CERN turn lead into gold, albeit briefly! Like this podcast? Please help us by supporting the Naked Scientists…
  continue reading
 
This week, our three hosts ⁠⁠⁠Dave Bittner⁠⁠⁠, ⁠⁠⁠Joe Carrigan⁠⁠⁠, and ⁠⁠⁠Maria Varmazis⁠⁠⁠ (also host of the ⁠⁠⁠T-Minus⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with a bit of follow up, one from listener Aaron, who shares some safety tips fo…
  continue reading
 
Threat Hunting Management Workshop: Structuring Collaboration Across Teams June 18, 2025 | 12:00 - 12:45 PM ET Sign up: https://intel471.com/resources/webinars/threat-hunting-management-workshop-structuring-collaboration-across-teams ---------- Top Headlines: Trend Micro | TikTok Videos Promise Pirated Apps, Deliver Vidar and StealC Infostealers In…
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analysts Joey and Alex as they discuss: Factors Driving Russian Market's Popularity Attackers' Favorite Infostealers Infostealer Attack Paths Main Types and Exclusivity of Stolen Logs Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat…
  continue reading
 
In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone share David Weston’s keynote from BlueHat India 2025. David explores the growing role of on-device AI in Windows, the security risks it introduces, and how Microsoft is rethinking architecture to defend against new threats like model tampering, data exfiltration, and AI-po…
  continue reading
 
Most Americans would agree that the United States should be protected, but from whom … and how? Dr. Donell Harvin, the former Chief of Homeland Security and Intelligence for the District of Columbia, says the U.S. is taking its eye off the ball - focusing its large domestic intelligence apparatus in a direction that is politically expedient, but no…
  continue reading
 
In this edition of The Naked Scientists: The new drug that cures mosquitoes of malaria. Intrigued? You'll see why scientists have done this, in just a minute. Also, the Microsoft AI system set to revolutionise weather forecasting, so you can plan that barbecue with impunity in future! And, 150 years of the metre, kilo and second: how science finall…
  continue reading
 
Top Headlines: Qualys | Fileless Execution: PowerShell Based Shellcode Loader Executes Remcos RAT WIRED | How the Signal Knockoff App TeleMessage Got Hacked in 20 Minutes WeLiveSecurity | ESET APT Activity Report Q4 2024–Q1 2025 BleepingComputer | New 'Defendnot' tool tricks Windows into disabling Microsoft Defender ---------- Stay in Touch! Twitte…
  continue reading
 
This week, our three hosts ⁠⁠Dave Bittner⁠⁠, ⁠⁠Joe Carrigan⁠⁠, and ⁠⁠Maria Varmazis⁠⁠ (also host of the ⁠⁠T-Minus⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Listener Jim notes that money launderers and couriers mentioned in recent episodes are often scam…
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Joey along with intelligence analysts John and Hayden as they discuss: ReliaQuest's investigation into hijacked routers and SEO poisoning fueling payroll heists Nation-state actors leveraging the SAP NetWeaver vulnerability en masse A new "Defendnot" tool that tricks Windows Defender into …
  continue reading
 
DevSecOps practices foster collaboration among software development, security, and operations teams to build, test, and release software quickly and reliably. A high-stakes, high-security environment has challenged the implementation of these practices within the Department of Defense (DoD). The DoD Chief Information Officer (CIO) organization part…
  continue reading
 
After Russia’s full scale invasion of Ukraine, the U.S. rushed to create a secret center that set targets for the Ukrainians to destroy. But the counteroffensive of 2023 failed to achieve its goals. So, what went wrong? New York Times reporter Adam Entous spent more than a year reporting on this story. He joins SpyCast host Sasha Ingber to talk abo…
  continue reading
 
Please enjoy this encore of Word Notes. Ineffectual confirmation of a user's identity or authentication in session management. CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/owasp-identification-and-authentication-failure⁠ Audio reference link: “⁠Mr. Robot Hack - Password Cracking - Episode 1⁠.” YouTube Video. YouTube, September 21, 20…
  continue reading
 
Top Headlines: Proofpoint | TA406 Pivots to the Front hunt.io | APT36-Linked ClickFix Campaign Spoofs Indian Ministry of Defence, Targets Windows & Linux Users Google Cloud Blog | COLDRIVER Using New Malware To Steal Documents From Western Targets and NGOs genians.co.kr | Analysis of APT37 Attack Case Disguised as a Think Tank for National Security…
  continue reading
 
In this edition of The Naked Scientists: New DNA evidence helps free a British man after 38 years in prison. Also, Cambridge scientists push up breast cancer survival rates and cut side effects with a new treatment regimen. And, why the near and the far side of the Moon are world's apart in appearance: it's all down to temperature differences insid…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play