389 Episodes

  1. Breaking barriers, one byte at a time.

    Published: 29/03/2025
  2. Excel-lerating cyberattacks.

    Published: 22/03/2025
  3. The ransomware clones of HellCat & Morpheus.

    Published: 15/03/2025
  4. Botnet’s back, tell a friend.

    Published: 08/03/2025
  5. Caught in the contagious interview.

    Published: 01/03/2025
  6. From small-time scams to billion-dollar threats.

    Published: 22/02/2025
  7. Bot or not? The fake CAPTCHA trick spreading Lumma malware.

    Published: 15/02/2025
  8. Cleo’s trojan horse.

    Published: 08/02/2025
  9. A Digital Eye on supply-chain-based espionage attacks.

    Published: 01/02/2025
  10. LightSpy's dark evolution.

    Published: 25/01/2025
  11. A cute cover for a dangerous vulnerability.

    Published: 18/01/2025
  12. The hidden cost of data hoarding.

    Published: 11/01/2025
  13. Crypto client or cyber trap?

    Published: 04/01/2025
  14. On the prowl for mobile malware.

    Published: 28/12/2024
  15. Quishing for trouble.

    Published: 21/12/2024
  16. Watching the watchers. IoT vulnerabilities exposed by AI.

    Published: 14/12/2024
  17. The JPHP loader breaking away from the pack.

    Published: 07/12/2024
  18. Leaking your AWS API keys, on purpose?

    Published: 30/11/2024
  19. Exposing AI's Achilles heel.

    Published: 23/11/2024
  20. Credential harvesters in the cloud.

    Published: 16/11/2024

1 / 20

Every Saturday, we sit down with cybersecurity researchers to talk shop about the latest threats, vulnerabilities, and technical discoveries.

Visit the podcast's native language site