Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
Episode | Date |
---|---|
Hacking at the Weeds with Felix Boulet
|
May 14, 2025 |
Evolutions in Hacking with Marco Ivaldi
|
Apr 30, 2025 |
From Facebook-Phished to MVR Top 5 with Dhiral Patel
|
Apr 16, 2025 |
AI & the Hunt for Hidden Vulnerabilities with Tobias Diehl
|
Apr 02, 2025 |
Cryptojacking, and Farewell for Now!
|
Feb 16, 2022 |
A look at Cybercrime in 2021
|
Feb 02, 2022 |
What’s a BISO?
|
Jan 19, 2022 |
Disinformation in the Enterprise
|
Jan 05, 2022 |
I am Shroot-less
|
Dec 22, 2021 |
Decoding NOBELIUM
|
Dec 08, 2021 |
Trusting Your Hybrid Workforce
|
Nov 24, 2021 |
When Privacy Meets Security
|
Nov 10, 2021 |
Securing Modern Software
|
Oct 27, 2021 |
The 2021 Microsoft Digital Defense Report
|
Oct 20, 2021 |
Mobile 4N6 101
|
Oct 13, 2021 |
Untangling Botnets
|
Oct 06, 2021 |
What the Fuzz?!
|
Sep 29, 2021 |
The ‘Three E’s’ of Scam Disruption
|
Sep 22, 2021 |
Entering the Virtual Battlefield
|
Sep 15, 2021 |
Battling BazaCall BuzzKill
|
Sep 01, 2021 |
Turning to the Purple Side
|
Aug 25, 2021 |
Protecting the Power Grid
|
Aug 18, 2021 |
Making the Leap to the Cloud
|
Aug 11, 2021 |
Mary Had a Little Scam Report
|
Aug 04, 2021 |
Talking Security With Non-Security Professionals
|
Jul 28, 2021 |
Discovering Router Vulnerabilities with Anomaly Detection
|
Jul 21, 2021 |
Securing the Internet of Things
|
Jul 14, 2021 |
Looking a Gift Card Horse in the Mouth
|
Jul 07, 2021 |
Simulating the Enemy
|
Jun 30, 2021 |
Dial 'T' for Tech Support Fraud
|
Jun 23, 2021 |
A Day in the Life of a Microsoft Principal Architect
|
Jun 16, 2021 |
Red-teaming AI with CounterFit
|
Jun 09, 2021 |
Pearls of Wisdom in the Security Signals Report
|
Jun 02, 2021 |
Securing Hybrid Work: Venki Krishnababu, lululemon
|
May 26, 2021 |
Contact Us; Phish You!
|
May 19, 2021 |
Securing the Cloud with Mark Russinovich
|
May 12, 2021 |
Ready or Not, Here A.I. Come!
|
May 05, 2021 |
Knowing Your Enemy: Anticipating Attackers’ Next Moves
|
Apr 28, 2021 |
Below the OS: UEFI Scanning in Defender
|
Apr 21, 2021 |
Inside Insider Risk
|
Apr 14, 2021 |
The Language of Cybercrime
|
Apr 07, 2021 |
The Human Element with Valecia Maclin
|
Mar 31, 2021 |
Identity Threats, Tokens, and Tacos
|
Mar 24, 2021 |
Re: Tracking Attacker Email Infrastructure
|
Mar 17, 2021 |
Celebrating Women in Security
|
Mar 08, 2021 |
Digital Crimes Investigates: Counterfeit Tales
|
Mar 03, 2021 |
Judging a Bug by Its Title
|
Feb 24, 2021 |
Enterprise Resiliency: Breakfast of Champions
|
Feb 17, 2021 |
Pluton: The New Bedrock for Device Security
|
Feb 10, 2021 |
BEC: Homoglyphs, Drop Accounts, and CEO Fraud
|
Feb 03, 2021 |
All Your Pa$$w0rd Are Belong to Us
|
Jan 27, 2021 |
Under the Hood: Ensuring Firmware Integrity
|
Jan 20, 2021 |
Tracking Nation State Actors
|
Jan 13, 2021 |
Unpacking the New ML Threat Matrix
|
Jan 06, 2021 |
Tackling Identity Threats With AI
|
Dec 23, 2020 |
Threat Modeling for Adversarial ML
|
Dec 09, 2020 |
The Mechanics of Digital Crime
|
Nov 25, 2020 |
Protecting Machine Learning Systems
|
Nov 11, 2020 |
How to Catch a Villian With Math
|
Oct 28, 2020 |
Protecting the Under-Secured With Bad Behavior
|
Oct 14, 2020 |
Unmasking Malicious Scripts With Machine Learning
|
Oct 14, 2020 |
Going Deep to Find the Unknown Unknowns
|
Oct 14, 2020 |
Security Unlocked - Trailer
|
Sep 30, 2020 |