Research Saturday

A podcast by N2K Networks - Saturdays

Categories:

358 Episodes

  1. Keeping data confidential with fully homomorphic encryption.

    Published: 3/13/2021
  2. Diving deep into North Korea's APT37 tool kit.

    Published: 3/6/2021
  3. Shining a light on China's cyber underground.

    Published: 2/27/2021
  4. Attackers (ab)using Google Chrome.

    Published: 2/20/2021
  5. Using the human body as a wire-like communication channel.

    Published: 2/13/2021
  6. "Follow the money" the cybersecurity way.

    Published: 2/6/2021
  7. The Kimsuky group from North Korea expands spyware, malware and infrastructure.

    Published: 1/30/2021
  8. Trickbot may be down, but can we count it out?

    Published: 1/23/2021
  9. Manufacturing sector is increasingly a target for adversaries.

    Published: 1/16/2021
  10. Emotet reemerges and becomes one of most prolific threat groups out there.

    Published: 1/9/2021
  11. Encore: Unpacking the Malvertising Ecosystem. [Research Saturday]

    Published: 1/2/2021
  12. Encore: Seedworm digs Middle East intelligence. [Research Saturday]

    Published: 12/26/2020
  13. Advertising Software Development Kit (SDK): serving up more than just in-app ads and logging sensitive data.

    Published: 12/19/2020
  14. Following DOJ indictment, a look back on NotPetya and Olympic Destroyer research.

    Published: 12/12/2020
  15. SSL-based threats remain prevalent and are becoming increasingly sophisticated.

    Published: 12/5/2020
  16. Encore: Using global events as lures for malicious activity.

    Published: 11/28/2020
  17. Misconfigured identity and access management (IAM) is much more widespread.

    Published: 11/21/2020
  18. That first CVE was a fun find, for sure.

    Published: 11/14/2020
  19. PoetRAT: a complete lack of operational security.

    Published: 11/7/2020
  20. Leveraging for a bigger objective.

    Published: 10/31/2020

10 / 18

Every Saturday, we sit down with cybersecurity researchers to talk shop about the latest threats, vulnerabilities, and technical discoveries.