Research Saturday

By N2K Networks

Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.

Image by N2K Networks

Category: Technology

Open in Apple Podcasts


Open RSS feed


Open Website


Rate for this podcast

Subscribers: 14
Reviews: 1
Episodes: 428

CyberGirl
 Oct 28, 2020
Awesome podcast to help you stay up to date on the latest cyber threats and advances in tech.

Description

Every Saturday, we sit down with cybersecurity researchers to talk shop about the latest threats, vulnerabilities, and technical discoveries.

Episode Date
Excel-lerating cyberattacks.
Dec 27, 2025
The lies that let AI run amok.
Dec 20, 2025
Root access to the great firewall.
Dec 13, 2025
When macOS gets frostbite.
Dec 06, 2025
A new stealer hiding behind AI hype.
Nov 29, 2025
Two RMMs walk into a phish…
Nov 22, 2025
When clicks turn criminal.
Nov 15, 2025
A fine pearl gone rusty.
Nov 08, 2025
Attack of the automated ops.
Nov 01, 2025
A look behind the lens.
Oct 25, 2025
Smile for the malware.
Oct 18, 2025
No honor among thieves.
Oct 11, 2025
China’s stealthiest spy operation yet.
Oct 04, 2025
Inside Curly COMrades.
Sep 27, 2025
Browser attacks without downloads.
Sep 20, 2025
Data leak without a click.
Sep 13, 2025
Don’t trust that app!
Sep 06, 2025
Cracks in the wall.
Aug 30, 2025
Beyond the smoke screen.
Aug 23, 2025
The CVE countdown clock.
Aug 16, 2025
When malware plays pretend.
Aug 09, 2025
nOAuth-ing to see here.
Aug 02, 2025
Muddled Libra: From Spraying to Preying in 2025 [Threat Vector]
Jul 26, 2025
Creeping like a spider.
Jul 19, 2025
Click here to steal.
Jul 12, 2025
Botnet’s back, tell a friend.
Jul 05, 2025
A tale of two botnets.
Jun 28, 2025
Signed, sealed, exploitable.
Jun 21, 2025
Hiding in plain sight with vibe coding.
Jun 14, 2025
A new stealer hiding behind AI hype.
Jun 07, 2025
Triofox and the key to disaster.
May 31, 2025
Pandas with a purpose.
May 24, 2025
Leveling up their credential phishing tactics.
May 17, 2025
Hijacking wallets with malicious patches.
May 10, 2025
When AI gets a to-do list.
May 03, 2025
China’s new cyber arsenal revealed.
Apr 26, 2025
Crafting malware with modern metals.
Apr 19, 2025
The new malware on the block.
Apr 12, 2025
Bybit’s $1.4B breach.
Apr 05, 2025
Breaking barriers, one byte at a time.
Mar 29, 2025
Excel-lerating cyberattacks.
Mar 22, 2025
The ransomware clones of HellCat & Morpheus.
Mar 15, 2025
Botnet’s back, tell a friend.
Mar 08, 2025
Caught in the contagious interview.
Mar 01, 2025
From small-time scams to billion-dollar threats.
Feb 22, 2025
Bot or not? The fake CAPTCHA trick spreading Lumma malware.
Feb 15, 2025
Cleo’s trojan horse.
Feb 08, 2025
A Digital Eye on supply-chain-based espionage attacks.
Feb 01, 2025
LightSpy's dark evolution.
Jan 25, 2025
A cute cover for a dangerous vulnerability.
Jan 18, 2025
The hidden cost of data hoarding.
Jan 11, 2025
Crypto client or cyber trap?
Jan 04, 2025
On the prowl for mobile malware.
Dec 28, 2024
Quishing for trouble.
Dec 21, 2024
Watching the watchers. IoT vulnerabilities exposed by AI.
Dec 14, 2024
The JPHP loader breaking away from the pack.
Dec 07, 2024
Leaking your AWS API keys, on purpose?
Nov 30, 2024
Exposing AI's Achilles heel.
Nov 23, 2024
Credential harvesters in the cloud.
Nov 16, 2024
A firewall wake up call.
Nov 09, 2024
Velvet Ant's silent invasion.
Nov 02, 2024
LLM security 101.
Oct 26, 2024
New targets, new tools, same threat.
Oct 19, 2024
Ransomware on repeat.
Oct 12, 2024
Podcast bait, malware switch.
Oct 05, 2024
Beyond the permissions wall.
Sep 28, 2024
Hook, line, and sinker.
Sep 21, 2024
Spamageddon: Xeon Sender’s cloudy SMS attack revealed!
Sep 14, 2024
The playbook for outpacing China.
Sep 07, 2024
Pop goes the developer.
Aug 31, 2024
MaaS infrastructure exposed.
Aug 24, 2024
Essential tools with critical security challenges.
Aug 17, 2024
Prompts gone rogue.
Aug 10, 2024
Spinning the web of tangled tactics.
Aug 03, 2024
The Black Basta ransomware riddle.
Jul 27, 2024
Olympic scammers go for gold.
Jul 20, 2024
On the prowl for mobile malware.
Jul 13, 2024
Encore: Welcome to New York, it's been waitin' for you.
Jul 06, 2024
APT36's cyber blitz on India.
Jun 29, 2024
Piercing the through the fog.
Jun 22, 2024
Exploring the mechanics of Infostealer malware.
Jun 15, 2024
Riding the hype for new Arc browser.
Jun 08, 2024
1700 IPs and counting.
Jun 01, 2024
International effort dismantles LockBit.
May 25, 2024
From secret images to encryption keys.
May 18, 2024
The double-edged sword of cyber espionage.
May 11, 2024
Geopolitical tensions rise with China.
May 04, 2024
Cerber ransomware strikes Linux.
Apr 27, 2024
The art of information gathering.
Apr 20, 2024
Breaking down a high-severity vulnerability in Kubernetes.
Apr 13, 2024
Leaking your AWS API keys, on purpose?
Apr 06, 2024
The supply chain in disarray.
Mar 30, 2024
HijackLoader unleashed: Evolving threats and sneaky tactics.
Mar 23, 2024
Inside SendGrid's phishy business.
Mar 16, 2024
Understanding the multi-tiered impact of ransomware.
Mar 09, 2024
The return of a malware menace.
Mar 02, 2024
Web host havoc: Unveiling the Manic Menagerie campaign.
Feb 24, 2024
Hackers come hopping back.
Feb 17, 2024
Ransomware is coming.
Feb 10, 2024
Weathering the internet storm.
Feb 03, 2024
Hooked on pirated macOS applications.
Jan 27, 2024
A firewall wake up call.
Jan 20, 2024
Dual Russian cyber gangs hit 23 companies.
Jan 13, 2024
Diving deep into Phobos ransomware.
Jan 06, 2024
Encore: What malicious campaign is lurking under the surface?
Dec 30, 2023
Encore: Compromised military tech?
Dec 23, 2023
Shedding light on fighting Ursa.
Dec 16, 2023
On the hunt for popping up kernel drives.
Dec 09, 2023
Exploits and vulnerabilities.
Dec 02, 2023
Encore: Another infection with new malware.
Nov 25, 2023
The malicious YoroTrooper in disguise.
Nov 18, 2023
Encore: Old malware returns in a new way.
Nov 11, 2023
Sandman doesn't slow malware down.
Nov 04, 2023
No rest for the wicked HiatusRAT.
Oct 28, 2023
AMBERSQUID hides in the depths.
Oct 21, 2023
Unwanted guests harvest your information.
Oct 14, 2023
Targets from DuckTail.
Oct 07, 2023
Downloading cracked software.
Sep 30, 2023
Behind the Google shopping ad masks.
Sep 23, 2023
A look into the emotions and anxieties of the highest levels of decision-making.
Sep 16, 2023
No honor in being a criminal.
Sep 09, 2023
Thwarting Muddled Libra.
Sep 02, 2023
Google's not being ghosted from vulnerabilities.
Aug 26, 2023
Politicians targeted by RomCom.
Aug 19, 2023
It's raining credentials.
Aug 12, 2023
Who is that stealing my credentials?
Aug 05, 2023
Phishing for leeches.
Jul 29, 2023
Welcome to New York, it's been waitin' for you.
Jul 22, 2023
SCARLETEEL zaps back again.
Jul 15, 2023
Creating PANDA-monium.
Jul 08, 2023
The power behind artificial intelligence.
Jul 01, 2023
Unleashing the crypto gold rush.
Jun 24, 2023
Managing machine learning risks.
Jun 17, 2023
A new botnet takes a frosty bite out of the gaming industry.
Jun 10, 2023
Lancefly screams bloody Merdoor.
Jun 03, 2023
8 GoAnywhere MFT breaches and counting.
May 27, 2023
Dangerous vulnerabilities in H.264 decoders.
May 20, 2023
Running away from operation Tainted Love.
May 13, 2023
Phishing campaign takes the energy out of Chinese nuclear industry.
May 06, 2023
HinataBot focuses on DDoS attack.
Apr 29, 2023
Don't let the Elon Musk crypto giveaway scam swindle you.
Apr 22, 2023
New Dero cryptojacking operation concentrates on locating Kubernetes.
Apr 15, 2023
A dark side to LLMs.
Apr 08, 2023
Blackfly flies back again.
Apr 01, 2023
Popunders are not the good kind of ads.
Mar 25, 2023
ChatGPT grants malicious wishes?
Mar 18, 2023
Files stolen from a sneaky SymStealer.
Mar 11, 2023
New exploits are tricking Chrome.
Mar 04, 2023
The next hot AI scam.
Feb 25, 2023
Implementing and achieving security resilience.
Feb 18, 2023
Knocking down the legs of the industrial security triad.
Feb 11, 2023
Can ransomware turn machines against us?
Feb 04, 2023
Flagging firmware vulnerabilities.
Jan 28, 2023
Billbug infests government agencies.
Jan 21, 2023
DUCKTAIL waddles back again.
Jan 14, 2023
Stealer malware from Russia.
Jan 07, 2023
Encore: LemonDucks evading detection.
Dec 31, 2022
Encore: Vulnerabilities in IoT devices.
Dec 24, 2022
Hijacking holiday spirit with phishing scams.
Dec 17, 2022
Cybersecurity during the World Cup.
Dec 10, 2022
Old malware returns in a new way.
Dec 03, 2022
Encore: The secrets behind Docker.
Nov 26, 2022
Another infection with new malware.
Nov 19, 2022
An in-depth look on the Crytox ransomware family.
Nov 12, 2022
Over-the-air 0-day vulnerabilities.
Nov 05, 2022
Bugs and working from home.
Oct 29, 2022
New tools target governments in Middle East?
Oct 22, 2022
Noberus ransomware: evolving tactics.
Oct 15, 2022
Google Drive used for malware?
Oct 08, 2022
Targeting your browser bookmarks?
Oct 01, 2022
Keeping an eye on RDS vulnerabilities.
Sep 24, 2022
An increase in bypassing bot management?
Sep 17, 2022
Evilnum APT returns with new targets.
Sep 10, 2022
LockBit's contradiction on encryption speed.
Sep 03, 2022
How a wide scale Facebook campaign stole 1 million credentials.
Aug 27, 2022
Clipminer: Making millions off of malware.
Aug 20, 2022
Fake job ads and how to spot them.
Aug 13, 2022
Iran-linked Lyceum Group adds a new weapon to its arsenal.
Aug 06, 2022
What malicious campaign is lurking under the surface?
Jul 30, 2022
Has GOLD SOUTHFIELD resumed operations?
Jul 23, 2022
A record breaking DDoS attack.
Jul 16, 2022
Information operations during a war.
Jul 09, 2022
Could REvil have a copycat?
Jul 02, 2022
Lazarus Targets Chemical Sector With 'Dream Job.'
Jun 25, 2022
Dissecting the Spring4Shell vulnerability.
Jun 18, 2022
New developments in the WSL attack.
Jun 11, 2022
LemonDucks evading detection.
Jun 04, 2022
Compromised military tech?
May 28, 2022
AutoWarp bug leads to Automation headaches.
May 21, 2022
Vulnerabilities in IoT devices.
May 14, 2022
Vulnerabilities bring in the hackers.
May 07, 2022
Attackers coming in from the Backdoor?
Apr 30, 2022
BABYSHARK is swimming again!
Apr 23, 2022
A fight to defend Taiwan financial institutions.
Apr 16, 2022
The secrets behind Docker.
Apr 09, 2022
A popular malware scheme and pay-per-install services.
Apr 02, 2022
The breakdown of Shuckworm's continued cyber attacks against Ukraine.
Mar 26, 2022
Implications of data leaks of sensitive OT information.
Mar 19, 2022
The story of REvil: From origin to beyond.
Mar 12, 2022
An abuse of trust: Potential security issues with open redirects.
Mar 05, 2022
Noberus ransomware: Coded in Rust and tailored to victim.
Feb 26, 2022
Instagram hijacks all start with a phish.
Feb 19, 2022
SysJoker backdoor masquerades as benign updates.
Feb 12, 2022
The persistent and patient nature of advanced threat actors.
Feb 05, 2022
Use of legitimate tools possibly linked to Seedworm.
Jan 29, 2022
A collaboration stumbles upon threat actor Lyceum.
Jan 22, 2022
Keeping APIs on the radar: Evaluating the banking industry.
Jan 15, 2022
The rise of Karakurt Hacking Team.
Jan 08, 2022
Encore: When big ransomware goes away, where should affiliates go?
Jan 01, 2022
CyberWire Pro Research Briefing from 12/21/2021.
Dec 25, 2021
Discovering ChaosDB, a critical vulnerability in the CosmosDB.
Dec 18, 2021
FIN7 repositioning focus into ransomware.
Dec 11, 2021
Getting in and getting out with SnapMC.
Dec 04, 2021
CyberWire Pro Research Briefing from 11/23/2021
Nov 27, 2021
Using bidirectionality override characters to obscure code.
Nov 20, 2021
A glimpse into TeamTNT.
Nov 13, 2021
An incident response reveals itself as GhostShell tool, ShellClient.
Nov 06, 2021
Malware sometimes changes its behavior.
Oct 30, 2021
When big ransomware goes away, where should affiliates go?
Oct 23, 2021
Groove Gang making a name for themselves.
Oct 16, 2021
Taking a closer look at UNC1151.
Oct 09, 2021
IoT security and the need for randomness.
Oct 02, 2021
Vulnerabilities in the public cloud.
Sep 25, 2021
An IoT educational exercise reveals a far-reaching vulnerability.
Sep 18, 2021
A Google Chrome update that just didn't feel right.
Sep 11, 2021
Like a computer network but for physical objects.
Sep 04, 2021
Joker malware family: not a joke for Google Play.
Aug 28, 2021
Exploring vulnerabilities of off-the-shelf software.
Aug 21, 2021
You can add new features, just secure the old stuff first.
Aug 14, 2021
SideCopy malware campaigns expand and evolve.
Aug 07, 2021
China's influence grows through Digital Silk Road Initiative.
Jul 31, 2021
Free malware with cracked software.
Jul 24, 2021
Enabling connectivity enables exposures.
Jul 17, 2021
Dealing illicit goods on encrypted chat apps.
Jul 10, 2021
Malware in pirated Windows installation files.
Jul 03, 2021
Exhibiting advanced APT-like behavior.
Jun 26, 2021
Primitive Bear spearphishes for Ukrainian entities.
Jun 19, 2021
Taking a look behind the Science of Security.
Jun 12, 2021
Bad building blocks: a new and unusual phishing campaign.
Jun 05, 2021
EtterSilent: a popular, versatile maldoc builder.
May 29, 2021
Leveraging COVID-19 themes for malicious purposes.
May 22, 2021
Jack Voltaic: critical infrastructure resiliency project, not a person.
May 15, 2021
SUPERNOVA activity and its possible connection to SPIRAL threat group.
May 08, 2021
A snapshot of the ransomware threat landscape.
May 01, 2021
Bulletproof hosting (BPH) and how it powers cybercrime.
Apr 24, 2021
Social engineering: MINEBRIDGE RAT embedded to look like job résumés.
Apr 17, 2021
Strategic titles point to something more than a commodity campaign.
Apr 10, 2021
Ezuri: Regenerating a different kind of target.
Apr 03, 2021
How are we doing in the industrial sector?
Mar 27, 2021
BendyBear: difficult to detect and downloader of malicious payloads.
Mar 20, 2021
Keeping data confidential with fully homomorphic encryption.
Mar 13, 2021
Diving deep into North Korea's APT37 tool kit.
Mar 06, 2021
Shining a light on China's cyber underground.
Feb 27, 2021
Attackers (ab)using Google Chrome.
Feb 20, 2021
Using the human body as a wire-like communication channel.
Feb 13, 2021
"Follow the money" the cybersecurity way.
Feb 06, 2021
The Kimsuky group from North Korea expands spyware, malware and infrastructure.
Jan 30, 2021
Trickbot may be down, but can we count it out?
Jan 23, 2021
Manufacturing sector is increasingly a target for adversaries.
Jan 16, 2021
Emotet reemerges and becomes one of most prolific threat groups out there.
Jan 09, 2021
Encore: Unpacking the Malvertising Ecosystem. [Research Saturday]
Jan 02, 2021
Encore: Seedworm digs Middle East intelligence. [Research Saturday]
Dec 26, 2020
Advertising Software Development Kit (SDK): serving up more than just in-app ads and logging sensitive data.
Dec 19, 2020
Following DOJ indictment, a look back on NotPetya and Olympic Destroyer research.
Dec 12, 2020
SSL-based threats remain prevalent and are becoming increasingly sophisticated.
Dec 05, 2020
Encore: Using global events as lures for malicious activity.
Nov 28, 2020
Misconfigured identity and access management (IAM) is much more widespread.
Nov 21, 2020
That first CVE was a fun find, for sure.
Nov 14, 2020
PoetRAT: a complete lack of operational security.
Nov 07, 2020
Leveraging for a bigger objective.
Oct 31, 2020
The Malware Mash!
Oct 30, 2020
Just saying there are attacks is not enough.
Oct 24, 2020
Intentionally not drawing attention.
Oct 17, 2020
It's still possible to find ways to break out.
Oct 10, 2020
Smaug: Ransomware-as-a-service drag(s)on.
Oct 03, 2020
What came first, the Golden Chickens or more_eggs?
Sep 26, 2020
Election 2020: What to expect when we are electing.
Sep 19, 2020
Leveraging legitimate tools.
Sep 12, 2020
Going after the most valuable data.
Sep 05, 2020
They fooled a lot of people.
Aug 29, 2020
Using global events as lures.
Aug 22, 2020
Waiting for their victims.
Aug 15, 2020
Like anything these days, you have to disinfect it first.
Aug 08, 2020
Detecting Twitter bots in real time.
Aug 01, 2020
It was only a matter of time.
Jul 25, 2020
Every time we get smarter, the bad guy changes something.
Jul 18, 2020
Are you running what you think you're running?
Jul 11, 2020
Enter the RAT.
Jun 27, 2020
Click here to update your webhook.
Jun 20, 2020
The value of the why and the who.
Jun 13, 2020
Due diligence cannot be done as a one-off.
Jun 06, 2020
Twofold snooping venture.
May 30, 2020
Naming and shaming is the worst thing we can do.
May 23, 2020
Gangnam Industrial Style APT campaign targets South Korea.
May 16, 2020
The U.S. campaign trail is actually quite secure.
May 09, 2020
Fingerprint authentication is not completely secure.
May 02, 2020
Contact tracing as COVID-19 aid.
Apr 25, 2020
How low can they go? A spike in Coronavirus phishing.
Apr 18, 2020
Profiling an audacious Nigerian cybercriminal.
Apr 11, 2020
A rough year ahead for ransomware attacks - and how to stop them.
Apr 04, 2020
Hidden dangers inside Windows and LINUX computers.
Mar 28, 2020
The security implications of cloud infrastructure in IoT.
Mar 21, 2020
TLS is here to stay.
Mar 14, 2020
Overworked developers write vulnerable software.
Mar 07, 2020
Application tracking in Wacom tablets.
Feb 29, 2020
New vulnerabilities in PC sound cards.
Feb 22, 2020
If you can't detect it, you can't steal it.
Feb 15, 2020
The Chameleon attacks Online Social Networks.
Feb 08, 2020
Tracking one of China's hidden hacking groups.
Feb 01, 2020
Know Thine Enemy - Identifying North American Cyber Threats.
Jan 25, 2020
Clever breaches demonstrate IoT security gaps.
Jan 18, 2020
Profiling the Linken Sphere anti-detection browser.
Jan 11, 2020
A Jira vulnerability that’s leaking data in the public cloud.
Jan 02, 2020
Inside Magecart and Genesis.
Dec 21, 2019
WAV files carry malicious data payloads.
Dec 14, 2019
Targeting routers to hit gaming servers.
Dec 07, 2019
Mustang Panda leverages Windows shortcut files.
Nov 23, 2019
Sodinokibi aka REvil connections to GandCrab.
Nov 16, 2019
Monitoring the growing sophistication of PKPLUG.
Nov 09, 2019
Usable security is a delicate balance.
Nov 02, 2019
Masad Steals via Social Media.
Oct 26, 2019
Hoping for SOHO security.
Oct 19, 2019
Decrypting ransomware for good.
Oct 12, 2019
The fuzzy boundaries of APT41.
Oct 05, 2019
Focusing on Autumn Aperture.
Sep 28, 2019
Leaky guest networks and covert channels.
Sep 21, 2019
Bluetooth blues: KNOB attack explained.
Sep 14, 2019
VOIP phone system harbors decade-old vulnerability.
Sep 07, 2019
Emotet's updated business model.
Aug 31, 2019
Gift card bots evolve and adapt.
Aug 24, 2019
Detecting dating profile fraud.
Aug 17, 2019
Unpacking the Malvertising Ecosystem.
Aug 10, 2019
Package manager repository malware detection.
Aug 03, 2019
Day to day app fraud in the Google Play store.
Jul 27, 2019
Nansh0u not your normal cryptominer.
Jul 20, 2019
Opportunistic botnets round up vulnerable routers.
Jul 13, 2019
Giving everyone a stake in the success of Open Source implementation.
Jun 29, 2019
Middleboxes may be meddling with TLS connections.
Jun 22, 2019
Apps on third-party Android store carry unwelcome code.
Jun 15, 2019
Xwo scans for default credentials and exposed web services.
Jun 08, 2019
Blockchain bandits plunder weak wallets.
Jun 01, 2019
A fresh look at GOSSIPGIRL and the Supra Threat Actors.
May 25, 2019
Elfin APT group targets Middle East energy sector.
May 18, 2019
Steganography enables sophisticated OceanLotus payloads.
May 11, 2019
Sea Turtle state-sponsored DNS hijacking.
May 04, 2019
Deep Learning threatens 3D medical imaging integrity.
Apr 27, 2019
Undetectable vote manipulation in SwissPost e-voting system.
Apr 20, 2019
Establishing software root of trust unconditionally.
Apr 13, 2019
Lessons learned from Ukraine elections.
Apr 06, 2019
Alarming vulnerabilities in automotive security systems.
Mar 30, 2019
Ryuk ransomware relationship revelations.
Mar 23, 2019
ThinkPHP exploit from Asia-Pacific region goes global.
Mar 16, 2019
Job-seeker exposes banking network to Lazurus Group.
Mar 09, 2019
Fake Fortnite app scams infect gamers.
Mar 02, 2019
Rosneft suspicions shift from espionage to business email compromise.
Feb 23, 2019
Seedworm digs Middle East intelligence.
Feb 16, 2019
Trends and tips for cloud security.
Feb 09, 2019
Online underground markets in the Middle East.
Feb 02, 2019
Amplification bots and how to detect them.
Jan 26, 2019
Luring IoT botnets to the honeypot.
Jan 19, 2019
Magecart payment card theft analysis.
Jan 12, 2019
NOKKI, Reaper and DOGCALL target Russians and Cambodians.
Jan 05, 2019
Apple Device Enrollment Program vulnerabilities explored.
Dec 22, 2018
The Sony hack and the perils of attribution.
Dec 15, 2018
Operation Red Signature targets South Korean supply chain.
Dec 08, 2018
Getting an education on Cobalt Dickens.
Dec 01, 2018
Doubling down on Cobalt Group activity.
Nov 17, 2018
Establishing international norms in cyberspace.
Nov 10, 2018
Election protection.
Nov 03, 2018
Faxploitation.
Oct 27, 2018
Stormy weather in the Office 365 cloud.
Oct 20, 2018
Driving GPS manipulation.
Oct 13, 2018
Cryptojacking criminal capers continue.
Oct 06, 2018
Sophisticated FIN7 criminal group hits payment card data.
Sep 29, 2018
ICS honeypots attract sophisticated snoops.
Sep 22, 2018
Android device eavesdropping investigation.
Sep 15, 2018
Leafminer espionage digs the Middle East.
Sep 08, 2018
ATM hacks on the rise.
Sep 01, 2018
Cyber espionage coming from Chinese University.
Aug 25, 2018
Stealthy ad fraud campaign evades detection.
Aug 18, 2018
Thrip espionage group lives off the land.
Aug 11, 2018
Cortana voice assistant lets you in.
Aug 04, 2018
BabaYaga strangely symbiotic Wordpress malware.
Jul 28, 2018
Measuring the spearphishing threat.
Jul 21, 2018
A new approach to mission critical systems.
Jul 14, 2018
No Distribute Scanners help sell malware.
Jul 07, 2018
VPNFilter malware could brick devices worldwide.
Jun 30, 2018
LG smartphone keyboard vulnerabilities.
Jun 23, 2018
Cyber bank heists.
Jun 16, 2018
Winnti Umbrella Chinese threat group.
Jun 09, 2018
Islamic State propaganda persistence.
Jun 02, 2018
UPnProxy infiltrates home routers.
May 26, 2018
Threat actors hijack Lojack.
May 19, 2018
Three pillars of Artificial Intelligence.
May 12, 2018
BlackTDS and ThreadKit offered in criminal markets.
May 05, 2018
New MacOS backdoor linked to OceanLotus.
Apr 28, 2018
InnaputRAT exfiltrates victim data.
Apr 21, 2018
Energetic Dragonfly and DYMALLOY Bear 2.0.
Apr 14, 2018
Crypto crumple zones.
Apr 07, 2018
Chasing FlawedAMMYY.
Mar 31, 2018
Code comments cause SAML conundrum.
Mar 24, 2018
Cryptojacking injections heat up.
Mar 17, 2018
Dark Caracal APT steals out of Lebanon.
Mar 10, 2018
Lebal malware phishes for victims.
Mar 03, 2018
Phishing for holiday winnings.
Feb 24, 2018
The uncanny HEX men.
Feb 17, 2018
IcedID banking trojan.
Feb 10, 2018
Advanced adware with nation-state tactics.
Feb 03, 2018
Targeting Olympic organizations.
Jan 27, 2018
Fancy Bear Duping Doping Domains.
Jan 20, 2018
Shake Your MoneyTaker.
Jan 13, 2018
TRISIS Malware: Fail-safe fail.
Jan 06, 2018
Hunting the Sowbug.
Dec 30, 2017
Keyboys back in town.
Dec 23, 2017
The unique culture of the Middle Eastern and North African underground.
Dec 16, 2017
Stealthy Zberp Banking Trojan.
Dec 09, 2017
Staying ahead of Fast Flux Networks.
Dec 02, 2017
Waiting for Terdot, a sneaky banking Trojan.
Nov 25, 2017
Dark Net Pricing with Flashpoint's Liv Rowley.
Nov 18, 2017
Taiwan Bank Heist and Lazurus Group with BAE's Adrian Nish.
Nov 11, 2017
Exploring Phishing Kits with Duo Security's Jordan Wright.
Nov 04, 2017
Tracking a Trojan: KHRAT.
Oct 28, 2017
WireX BotNet with Justin Paine from Cloudflare.
Oct 21, 2017
Synthesized DNA Malware with Peter Ney.
Oct 14, 2017
Android Toast Overlay: Ryan Olson from Palo Alto Networks.
Oct 07, 2017
APT 33: FireEye's John Hultquist on an Iranian Cyber Espionage Group.
Sep 30, 2017
Pacifier APT : Bitdefender's Liviu Arsene describes a sophisticated, multifaceted malware campaign.
Sep 23, 2017
Cobian RAT: Zscaler’s Deepen Desai describes some clever malware.
Sep 16, 2017