
The Cyber Riddler
The Cyber Riddler is a podcast that discusses interesting topics in the field of information security. It explores different areas and situations in real-life cyber security engagements and activities. Episodes feature guests from different backgrounds such as hackers, security analysts, cyber security managers, bug bounty hobbyists and more.
Episodes
27 episodes
Initial Access
In this episode of the cyber riddler, we talked about the critical first stage of cyberattacks: Initial Access. Learn how hackers breach organizations using tactics like phishing, exploiting vulnerabilities, stolen credentials, and supply...
•
Season 2
•
Episode 23
•
6:57

Threats and Defenses
In this episode, we explore the modern cybersecurity threat landscape, examining sophisticated attacks like ransomware-as-a-service, supply chain breaches, and file-less malware. We discuss essential defensive strategies, including the use of Z...
•
Season 2
•
Episode 22
•
12:47

Zero-Day Exploits
In this episode of The Cyber Riddler podcast, we venture into the shadowy world of zero-day exploits, one of the most well known threats in the cybersecurity world . Zero-day exploits represent vulnerabilities that can be targeted before th...
•
Season 2
•
Episode 21
•
11:33

Threat Hunting
In this episode, delve into the world of cyber security through the lens of expert threat hunters. As they navigate the complex digital landscape, these skilled professionals employ advanced techniques and tools to investigate systems meticulou...
•
Season 2
•
Episode 20
•
6:33

Phishing World
In this episode of The Cyber Riddler, We dive into the cunning world of phishing scams, focusing on how Normal Users are reacting to these emails and how SOC (Security Operations Center) analysts can expertly analyze suspicious emails. We...
•
Season 2
•
Episode 19
•
8:14

HTTPS and TLS Tales
Explore the world of web security in our latest episode, 'HTTPS and TLS Tales' deep into the mechanisms that differentiate HTTPS from HTTP, uncovering the layers of encryption, authentication, and data integrity that safeguard our online ...
•
Season 1
•
Episode 18
•
10:23

Threat Intelligence
In this episode, we'll dive deep into the world of Threat Intelligence, exploring its critical role in cybersecurity. From the basics of data collection to the challenges of information sharing, we'll cover it all. Discover how Threat Intellige...
•
Season 1
•
Episode 17
•
7:13

Lateral Movement
Dive into the shadowy world of lateral movement in cybersecurity. In this episode of The Cyber Riddler. Explore how attackers stealthily navigate networks post-breach, using techniques from credential exploitation to abusing legitimate to...
•
Season 1
•
Episode 16
•
8:49

Insider Threat
In this episode of The Cyber Riddler, we dive deep into the shadowy world of insider threats. We unravel the complexities of individuals within an organization who pose a risk to its security from the inside. We'll explore real-life cases, diss...
•
Season 1
•
Episode 15
•
8:07

The Lazarus Group
In this episode we've talked about The Lazarus Group, Which is a cybercrime group made up of an unknown number of individuals run by the government of North Korea. We've discussed about their latest campaign where they targeted security researc...
•
Season 1
•
Episode 14
•
6:58

Malware Analysis - Karsten Hahn
In this episode we've covered the basics of malware analysis. Things that malware authors want to hide in their malware. How they want to make it hard for malware analysts to do their job. Our guest today has an extensive experience in malware ...
•
Season 1
•
Episode 13
•
35:30

Kernel Drivers - Yarden Shafir
In this episode we've talked about kernel drivers, We covered a variety of different topics like how to load a driver, signing process, HVCI and others, and we closed with Intel CET and Shadow stack. Yarden has a very great experience when it c...
•
Season 1
•
Episode 12
•
47:27

Vulnerability Research - Kevin Backhouse
Dive into cybersecurity's captivating world with our latest episode on Vulnerability Research! Discover the secrets of ethical hackers, uncover different vulnerabilities, and explore responsible disclosure processes. Get insider tips and tricks...
•
Season 1
•
Episode 11
•
1:02:23

Windows Internals - Pavel Yosifovich
This Week's episode is about Windows Internals in depth, we've talked about things from an offensive and defensive perspective. Things like Hooks, Kernel callbacks, how security companies are using them and how Red Teamers are leveraging them a...
•
Season 1
•
Episode 10
•
45:26

Getting started with DFIR - Paula Januszkiewicz
In this episode we talked about Digital forensics and Incident response aka DFIR, how to get started, and how crucial it is to deal with incidents. We also talked about various topics including memory dump and analysis, ransomeware and stories ...
•
Season 1
•
Episode 9
•
44:00

DNS - Attacks
This week's episode talks about DNS in general and DNS attacks, we barely scratched the surface. DNS is playing a major role in our network communication and hackers take advantage of DNS attacks for their own gain. Twi...
•
Season 1
•
Episode 8
•
6:15

LoLBins - Living Off The Land Binaries
LoLBins or Living Off The Land Binaries are binaries within the operating system it doesn't matter if it's a windows or unix based system. these binaries are heavily utilized by hackers to avoid detections, in this episode we will be diving int...
•
Season 1
•
Episode 7
•
6:03

Browser Exploitation
In this episode we scratched the surface of browser exploitation methods and we went through different techniques used by the attackers to gain access to your device. We also went through different old CVEs that have been used in the past. We h...
•
Season 1
•
Episode 6
•
6:40

Ransomware with Lance James
In this episode we talked about cryptography in general and then we dived into the world of ransomware starting from when ransomware approximately started and then we talked about ransomware tactic and delivery mechanisms , evasion techniques a...
•
Season 1
•
Episode 5
•
59:02

Episode 4 [Ar]: PRNGs and Randomness
Today's episode is about Pseudo Random Number Generators and how we can achieve Randomization. We also explain how applications can suffer big time when they don't have random values generated in their crypto systemsTwitter:...
•
Season 1
•
Episode 4
•
8:16

Episode 4 [En]: PRNGs and Randomness
Today's episode is about Pseudo Random Number Generators and how we can achieve Randomization. We also explain how applications can suffer big time when they don't have random values generated in their crypto systemsTwitter:...
•
Season 1
•
Episode 4
•
6:14

Episode 3 [EN]: Juicy Exploits
Exploit code are amazing, But sometimes the technique behind itis what makes it shiny, In this episode I want you to look at exploitcodes from different perspective. not just finding vulnerabilities for the sake of finding vulnerabi...
•
Season 1
•
Episode 3
•
9:43

Episode 2 [En]: APT Groups and APT29
This Episode will give you a glance of Threat Intelligence and the world of APTsin this episode we will talk in general about different APT Groups, specificallyabout APT 29 aka Cozy Bear and how they achieve stealthiness while hiding in...
•
Season 1
•
Episode 2
•
8:39

Episode 2 [Ar]: APT Groups and APT29
This Episode will give you a glance of Threat Intelligence and the world of APTsin this episode we will talk in general about different APT Groups, specificallyabout APT 29 aka Cozy Bear and how they achieve stealthiness while hiding in...
•
Season 1
•
Episode 2
•
9:53

Episode 1 [En]: VPN and Proxy Issues
Today's episode is about VPNs and proxies from their standard usage to how the bad guys are using it. We will be diving through some technical aspects of using these commercial and free services and the privacy issues that comes along with it. ...
•
Season 1
•
Episode 1
•
10:26
