Podcast Episodes
Back to Search
Have you heard: Only Malware in the Building?
Send us fan mail!
Check out new episodes of Only Malware in the Building wherever you listen to podcasts:https://thecyberwire.com/podcasts/only-malwar…
1 year, 8 months ago
Malware Evasion Uncovered: The Battle Against Evolving Malware Techniques
Send us fan mail!
Hello, Cyber Pirates! In today's episode of the Discarded Podcast, hosts Selena Larson and Tim Kromphardt are joined by Kyle Cucci, …1 year, 8 months ago
Checkmate: Breaking Down Operation Endgame
Send us fan mail!
Hello, cyber sleuths! In today's exciting episode of the Discarded Podcast, hosts Selena Larson and Sarah Sabotka are joined by the …1 year, 9 months ago
Hacking the Human Mind: How Cyber Attackers Exploit Our Brains
Send us fan mail!
Hello to all our cyber squirrels! Joining our series host, Selena Larson, is our co-host today, Tim Kromphardt. Together they welcom…1 year, 9 months ago
Decrypting Cyber Threats: Tactics, Takedowns, and Resilience
Send us fan mail!
Hello to all our cyber pals! Joining our series host, Selena Larson, is our co-host today, Tim Kromphardt. Together they welcome our…1 year, 9 months ago
It Works on My Machine: Why and How Engineering Skills Matter in Threat Research
Send us fan mail!
The Discarded Podcast team is gearing up and working hard for a new season! Until then we have a special Re-Run treat--one of our fa…1 year, 10 months ago
Decoding TA4903: Exploring the Dual Objectives of a Unique Cyber Threat Actor
Send us fan mail!
Today’s focus is on the elusive threat actor known as TA4903. But that's not all - we've got a special treat for you as well. Our lo…1 year, 11 months ago
A Trip Down Malware Lane: How Today's Hottest Malware Stacks Up Against Predecessors
Send us fan mail!
It has been a busy first quarter for the Proofpoint Threat Research team! Today we have returning guest, Pim Trouerbach, to share hi…2 years ago
Hiding In Plain Sight: Unique Methods Of C2 From Infostealers
Send us fan mail!
Network-based detections, such as those developed by threat detection engineers using tools like suricata and snort signatures, play…2 years ago
From Attribution to Advancement: Red Canary’s Katie Nickels Tackles CTI’s Biggest Questions
Send us fan mail!
The esteemed Katie Nickels joins us on the show today! Katie is the Director of Intelligence Operations at Red Canary, and our conve…2 years, 1 month ago