Podcasts Podcasts Subscribe to Podcasts Find us on: A Device Code Explosion: The New Era of AI-Enabled Phishing DISCARDED Champagne with Our Campaigns: A 100th Episode Happy Hour DISCARDED Magic Packets & Stealth Backdoors: The Art of Detection Engineering DISCARDED Search Select SeriesDISCARDEDExpert InsightsFive Minute ForecastHackable MeHow to Be a Cyber CriminalProtecting PeopleTackling User BehaviorThe Human Side of HackingThe Inside Line on Information ProtectionThe People VariableThreat Digest Hiding In Plain Sight: Unique Methods Of C2 From Infostealers DISCARDED Risky and They Know It: Unveiling Human Behavior in the State of the Phish Report 2024 Protecting People From Attribution to Advancement: Red Canary’s Katie Nickels Tackles CTI’s Biggest Questions DISCARDED Beyond the Headlines: Reporting on Sensitive Cybersecurity Topics to Resonate with Everyone DISCARDED Jan 29, 2024: 23andMe Shares Details of Data Theft, Ransomware Payments Drop to New Low Five Minute Forecast Microsoft's Secure Future Initiative: A New Hope or Old Hype? Protecting People Strategies for Defense and Disruption: Part Two of Predicting Cyber Threats in 2024 DISCARDED Jan 22, 2024: Microsoft Hit by Russian Attackers, 3AM Ransomware Linked to Conti Five Minute Forecast Jan 15, 2024: CISA Warns of SharePoint Vulnerability, ALPHV Steals 1.3M Records Five Minute Forecast Phishing, Elections, and Costly Attacks: Part One of Predicting Cyber Threats in 2024 DISCARDED Jan 8, 2024: LockBit Threatens Health Data Leak, Crypto Scams Surge on Social Media Five Minute Forecast Jingle Bells, Phishing Tales: Reflecting on Cybersecurity in the Holiday Spirit DISCARDED Load More Episodes Subscribe to Podcasts