Podcasts Podcasts Subscribe to Podcasts Find us on: A Device Code Explosion: The New Era of AI-Enabled Phishing DISCARDED Champagne with Our Campaigns: A 100th Episode Happy Hour DISCARDED Magic Packets & Stealth Backdoors: The Art of Detection Engineering DISCARDED Search Select SeriesDISCARDEDExpert InsightsFive Minute ForecastHackable MeHow to Be a Cyber CriminalProtecting PeopleTackling User BehaviorThe Human Side of HackingThe Inside Line on Information ProtectionThe People VariableThreat Digest From Rio to Madrid: Unmasking the Brazilian Banking Malware Wave DISCARDED Five-Minute Forecast for the Week of Sep 5, 2023 Five Minute Forecast Looking Inward: Preventing, Detecting and Mitigating Insider Threats Protecting People Five-Minute Forecast for the Week of Aug 28, 2023 Five Minute Forecast Everything Comes Back in Style: How Old TTPs are Remerging in China's E-Crime Ecosystem DISCARDED Five-Minute Forecast for the Week of Aug 21, 2023 Five Minute Forecast It Works on My Machine: Why and How Engineering Skills Matter in Threat Research DISCARDED Invasion of the Account Snatchers: Why Account Takeover is One of Cybersecurity's Biggest Threats Protecting People Five-Minute Forecast for the Week of Aug 14, 2023 Five Minute Forecast Five-Minute Forecast for the Week of Aug 7, 2023 Five Minute Forecast Five-Minute Forecast for the Week of Jul 31, 2023 Five Minute Forecast An Apple a Day Won't Keep Iranian APT Away: How TA453 Targets Macs DISCARDED Load More Episodes Subscribe to Podcasts