Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
| Episode | Date |
|---|---|
|
Speed, Stealth, and AI: The CrowdStrike 2026 Global Threat Report
|
Feb 24, 2026 |
|
Interview with a Threat Hunter: Brody Nisbet, Sr. Director of CrowdStrike OverWatch
|
Feb 12, 2026 |
|
LABYRINTH CHOLLIMA Evolves into Three Adversaries
|
Jan 29, 2026 |
|
Taking Down Cybercriminals with Shawn Henry, Former FBI Leader
|
Jan 15, 2026 |
|
2025 Wrapped: Updates on This Year’s Hottest Topics
|
Dec 30, 2025 |
|
Is This Endgame? How Takedowns Are Reshaping eCrime
|
Dec 18, 2025 |
|
Defrosting Cybersecurity’s Cold Cases with CrowdStrike’s Tillmann Werner
|
Dec 04, 2025 |
|
Prompted to Fail: The Security Risks Lurking in DeepSeek-Generated Code
|
Nov 20, 2025 |
|
Extortion Rises and Nation-State Activity Intensifies: The CrowdStrike 2025 European Threat Landscape Report
|
Nov 06, 2025 |
|
Thriving Marketplaces and Regional Threats: The CrowdStrike 2025 APJ eCrime Landscape Report
|
Oct 23, 2025 |
|
A Brief History of Ransomware
|
Oct 16, 2025 |
|
Tech Sector Targeting, Innovation Race, Fal.Con Countdown
|
Sep 12, 2025 |
|
Live at Black Hat: What’s AI Really Capable Of?
|
Aug 18, 2025 |
|
Cloud Intrusions Rise, eCrime Thrives, Governments Under Attack: CrowdStrike 2025 Threat Hunting Report
|
Aug 04, 2025 |
|
The Return of SCATTERED SPIDER
|
Jul 17, 2025 |
|
Ask Us (Almost) Anything: Threat Intel, Adversaries, and More
|
Jul 03, 2025 |
|
When the Adversary Shows Up in Person
|
Jun 19, 2025 |
|
Where AI Fits in the Adversary’s Toolbox
|
Jun 05, 2025 |
|
Catching Up on Cloud Attack Paths with Cloud Threat Specialist Sebastian Walla
|
May 28, 2025 |
|
Inside the CrowdStrike 2025 Latin America Threat Landscape Report
|
May 08, 2025 |
|
OCULAR SPIDER and the Rise of Ransomware-as-a-Service
|
Apr 10, 2025 |
|
Meet LUNAR SPIDER: The Inner Workings of an eCrime Adversary
|
Mar 27, 2025 |
|
NSOCKS: Insights into a Million-Dollar Residential Proxy Service
|
Mar 13, 2025 |
|
China’s Cyber Enterprise Grows: CrowdStrike 2025 Global Threat Report
|
Feb 27, 2025 |
|
A Deep Dive into DeepSeek and the Risks of Foreign LLMs
|
Feb 20, 2025 |
|
Putting a Spotlight on Energy Sector Threats with Corelight's Greg Bell
|
Feb 06, 2025 |
|
See You I-Soon: A Peek at China’s Offensive Cyber Operations
|
Jan 16, 2025 |
|
The Most Prolific Adversaries and Threats of 2024
|
Dec 19, 2024 |
|
Cross-Domain Attacks: Know Them, Find Them, Stop Them
|
Dec 12, 2024 |
|
LIMINAL PANDA and the Implications of Global Telco Targeting
|
Nov 27, 2024 |
|
Exploring Offensive Security with CrowdStrike Red Teamers
|
Nov 07, 2024 |
|
The Latest in China-Taiwan Cyber Tensions
|
Oct 24, 2024 |
|
How CrowdStrike Tracked INDRIK SPIDER from Origin to Takedown
|
Oct 10, 2024 |
|
Small But Mighty: The Kernel’s Essential Role in Cybersecurity Defense
|
Oct 01, 2024 |
|
Coming Soon to Las Vegas: Adversary Universe Previews #FalCon2024
|
Sep 12, 2024 |
|
Intern Spotlight: Starting A Cyber Career with CrowdStrike
|
Aug 29, 2024 |
|
Hunting the Rogue Insiders Operating for FAMOUS CHOLLIMA
|
Aug 21, 2024 |
|
Talking OT Security with Fernando Madureira, Global CISO of Cosan
|
Jul 11, 2024 |
|
How Adversaries Respond to Law Enforcement Takedowns
|
Jun 27, 2024 |
|
When the Adversary Knows They’re Caught
|
Jun 13, 2024 |
|
Unpacking China-India Cyber Tensions
|
May 30, 2024 |
|
Understanding Social Engineering with Shelly Giesbrecht, Director, Professional Services
|
May 23, 2024 |
|
Hacktivism and the JACKALs Behind It
|
May 09, 2024 |
|
Building a Strong Threat Hunting Program with Andrew Munchbach
|
Apr 25, 2024 |
|
Adversary Attribution: What It Means and How It Works
|
Apr 11, 2024 |
|
LIVE from Gov Threat Summit: A Chat with Morgan Adamski, Chief of the NSA’s Cybersecurity Collaboration Center
|
Mar 28, 2024 |
|
CrowdStrike CSO Shawn Henry on Election Security, Nation-State Threats and His FBI Career
|
Mar 14, 2024 |
|
A Human at the Keyboard: CrowdStrike Reports 60% Jump in Interactive Intrusions
|
Feb 22, 2024 |
|
The Dark Personality Traits Fueling Cybercrime
|
Feb 15, 2024 |
|
Demystifying North Korea: Why the "Hermit Kingdom" Is a Cyber Threat to Watch
|
Feb 01, 2024 |
|
AI Through the Defender’s Lens: A Chat with CrowdStrike’s Global CTO
|
Jan 18, 2024 |
|
Inside Russia’s Laboratory of Cyber Operations — and Beyond
|
Jan 11, 2024 |
|
Adversary Universe: 2023 Highlights
|
Dec 28, 2023 |
|
Inside the ”Alphabet Soup” of Incident Reporting Regulations
|
Dec 14, 2023 |
|
Data Extortion Dethrones Ransomware as the Threat to Watch
|
Nov 30, 2023 |
|
Urgent Care Required: The State of Healthcare Cybersecurity
|
Nov 16, 2023 |
|
Iran’s Rise from Nascent Threat Actor to Global Adversary
|
Nov 09, 2023 |
|
Inside China’s Evolution as a Global Security Threat
|
Nov 02, 2023 |
|
Have You Been Breached?
|
Oct 19, 2023 |
|
The Rise of the Access Brokers
|
Oct 05, 2023 |
|
Inside the AI, Cloud and Platform Innovations Previewed at Fal.Con 2023
|
Sep 29, 2023 |
|
Adversaries and AI: Today’s Reality and Tomorrow’s Potential
|
Sep 21, 2023 |
|
Ransomware Actors Mark Their Calendars for Back-to-School
|
Sep 07, 2023 |
|
Invisible Threats: Discovering, Tracking and Mitigating Vulnerabilities
|
Aug 24, 2023 |
|
Intel-Led Threat Hunting with CrowdStrike Counter Adversary Operations
|
Aug 10, 2023 |
|
Is Microsoft’s Monoculture a National Security Risk?
|
Aug 03, 2023 |
|
Cloud is the New Battleground
|
Jul 27, 2023 |
|
Who is the Adversary?
|
Jul 13, 2023 |
|
Adversary Universe Podcast Trailer
|
Jun 28, 2023 |