Podcasts Podcasts Subscribe to Podcasts Find us on: A Device Code Explosion: The New Era of AI-Enabled Phishing DISCARDED Champagne with Our Campaigns: A 100th Episode Happy Hour DISCARDED Magic Packets & Stealth Backdoors: The Art of Detection Engineering DISCARDED Search Select SeriesDISCARDEDExpert InsightsFive Minute ForecastHackable MeHow to Be a Cyber CriminalProtecting PeopleTackling User BehaviorThe Human Side of HackingThe Inside Line on Information ProtectionThe People VariableThreat Digest When Being Aware of Cybersecurity Means Knowing You're Human DISCARDED Hot sauce and hot takes: An Only Malware in the Building special DISCARDED Freighty Cats: RFQ Phishing Comes to A Warehouse Near You DISCARDED Direct Send Exploitation & URL Rewrite Attacks: What Security Teams Must Know DISCARDED Phish, Chips & Voldemort: Inside China’s Cyber Targeting of Taiwan DISCARDED Threat Actor Theater: TA2541, TA558, and the Cyber Heist Crew TA582 DISCARDED 10 Things I Hate About Attribution: A Clustering Conundrum DISCARDED Comic Sans and Cybercrime: Inside North Korea’s Global Cyber Playbook DISCARDED Signatures and Surprises: Inside the Emerging Threats Team DISCARDED DBIR Deep Dive: Identity, Access, and the Expanding Attack Surface DISCARDED The ClickFix Convergence: How Threat Actors Blur the Lines DISCARDED The Art of the Innocent Ask: How Threat Actors Use Benign Conversations DISCARDED Load More Episodes Subscribe to Podcasts