エピソード

  • Logs Don't Lie
    2025/09/21

    Dive into the hidden world of Windows Event Logs — where SOC analysts uncover patterns, trace intrusions, and expose how attackers exploit the very logs meant to catch them. Learn how to spot the signals, build timelines, and stay one step ahead of the breach.


    • X: @almorabea
    • X: @CyberRiddler
    • Website: https://thecyberriddler.com
    続きを読む 一部表示
    8 分
  • Initial Access
    2024/11/21

    In this episode of the cyber riddler, we talked about the critical first stage of cyberattacks: Initial Access. Learn how hackers breach organizations using tactics like phishing, exploiting vulnerabilities, stolen credentials, and supply chain attacks. We’ll explore real-world examples, discuss why initial access is so crucial, and share practical strategies to defend against these threats. Whether you’re a cybersecurity professional or just curious about how breaches happen, this episode is packed with insights to help you stay one step ahead.


    • Twitter: @almorabea
    • Twitter: @CyberRiddler
    • Website: https://thecyberriddler.com
    続きを読む 一部表示
    7 分
  • Threats and Defenses
    2024/09/05

    In this episode, we explore the modern cybersecurity threat landscape, examining sophisticated attacks like ransomware-as-a-service, supply chain breaches, and file-less malware. We discuss essential defensive strategies, including the use of Zero Trust architecture, behavioral analytics, and other tools. Alongside these defenses, we emphasize the importance of proactive threat hunting and a strong incident response plan. This episode serves as a reminder of what you should do and hunt for threats in your environment.

    • Twitter: @almorabea
    • Twitter: @CyberRiddler
    • Website: https://thecyberriddler.com
    続きを読む 一部表示
    13 分
  • Zero-Day Exploits
    2024/06/04


    In this episode of The Cyber Riddler podcast, we venture into the shadowy world of zero-day exploits, one of the most well known threats in the cybersecurity world . Zero-day exploits represent vulnerabilities that can be targeted before they are even known to exist, making them a significant concern for both organizations and individuals. We explore the lifecycle of a zero-day exploit, from discovery and weaponization to delivery and exploitation. Through notable case studies, we illustrate the profound impact these exploits can have. Additionally, we discuss the challenges faced by incident responders in dealing with unknown threats and the strategies that can be employed to defend against them.

    • Twitter: @almorabea
    • Twitter: @CyberRiddler
    • Website: https://thecyberriddler.com
    続きを読む 一部表示
    12 分
  • Threat Hunting
    2024/03/26

    In this episode, delve into the world of cyber security through the lens of expert threat hunters. As they navigate the complex digital landscape, these skilled professionals employ advanced techniques and tools to investigate systems meticulously. Their mission: to unearth hidden implants and payloads that lurk undetected, posing significant risks. Through a combination of expertise, intuition, and cutting-edge technology, they reveal how they stay one step ahead of cyber threats, ensuring the digital safety of organizations. Witness the high-stakes game of cyber threat hunting, where every clue uncovered could be the key to thwarting cybercriminals and safeguarding valuable data.

    • Twitter: @almorabea
    • Twitter: @CyberRiddler
    • Website: https://thecyberriddler.com
    続きを読む 一部表示
    7 分
  • Phishing World
    2024/02/06

    In this episode of The Cyber Riddler, We dive into the cunning world of phishing scams, focusing on how Normal Users are reacting to these emails and how SOC (Security Operations Center) analysts can expertly analyze suspicious emails. We outline the essential tools and steps for dissecting emails, from examining sender addresses and email headers to scrutinizing links and attachments for malicious content. The episode also stresses the importance of staying updated on phishing trends, collaborative reporting, and fostering a culture of cybersecurity awareness within organizations. It's a must-listen for a normal user and cybersecurity professionals looking to sharpen their skills and anyone curious about the inner workings of email scam detection.

    • Twitter: @almorabea
    • Twitter: @CyberRiddler
    • Website: https://thecyberriddler.com
    続きを読む 一部表示
    8 分
  • HTTPS and TLS Tales
    2023/12/30

    Explore the world of web security in our latest episode, 'HTTPS and TLS Tales' deep into the mechanisms that differentiate HTTPS from HTTP, uncovering the layers of encryption, authentication, and data integrity that safeguard our online interactions. From the pivotal role of TLS to real-world cases of security breaches and the evolving landscape of cyber threats, this episode offers a comprehensive look at the technologies that keep the internet secure.

    • Twitter: @almorabea
    • Twitter: @CyberRiddler
    • Website: https://thecyberriddler.com
    続きを読む 一部表示
    10 分
  • Threat Intelligence
    2023/12/10

    In this episode, we'll dive deep into the world of Threat Intelligence, exploring its critical role in cybersecurity. From the basics of data collection to the challenges of information sharing, we'll cover it all. Discover how Threat Intelligence empowers organizations to detect and respond to cyber threats, and stay ahead of evolving tactics. Join us for a comprehensive discussion that sheds light on this essential aspect of modern cybersecurity.

    • Twitter: @almorabea
    • Twitter: @CyberRiddler
    • Website: https://thecyberriddler.com
    続きを読む 一部表示
    7 分