
Hunting Variants: Finding the Bugs Behind the Bug
In this episode of The BlueHat Podcast, host Nic Fillingham is joined by George Hughey from Microsoft who returns to discuss his Blue Hat In...
Radio and PodcastLive Radio & PodcastsOpening Radio and Podcast...

Radio and PodcastLive Radio & PodcastsFetching podcast shows and categories...
Radio and PodcastLive Radio & PodcastsFetching podcast episodes...

Security Unlocked explores the technology and people powering Microsoft's Security solutions. In each episode, Microsoft Security evangelists Nic Fillingham and Natalia Godyla take a closer...

In this episode of The BlueHat Podcast, host Nic Fillingham is joined by George Hughey from Microsoft who returns to discuss his Blue Hat In...

In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone are joined by Mike Macelletti from Microsoft’s MSRC Vulnerabili...

In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone share Ram Shankar Siva Kumar’s dynamic keynote from BlueHat Ind...

In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone share David Weston’s keynote from BlueHat India 2025. David exp...

In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone are joined by Felix Boulet fresh off his participation in Zero...

In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone are joined by Marco Ivaldi , co-founder and technical director...

In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone are joined by Dhiral Patel , Senior Security Engineer at ZoomIn...

In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone are joined by security researcher Tobias Diehl , a top contribu...

The success of crypto inspired dozens of other cryptocurrencies like Ethereum, Tether, and Dogecoin. Today, people worldwide use cryptocurre...

Ransomware attacks have never been so successful. The returns from these attacks are soaring and only becoming easier to conduct. In chapter...

Everything is exciting and new when you're a kid, and curiosity inspires many of us to branch out and try new things. For some, that means d...

Disinformation refers to the calculated use of false information to influence others and has been a steadily growing form of information war...

Microsoft works around the clock to protect their customers, no matter what product they’re using, Microsoft or otherwise. In some instances...

In December 2020, Microsoft began sharing information with the cybersecurity industry on a group of Russia-based hackers who gained access t...

We are back, covering more of the 2021 Microsoft Digital Defense Report, and this time we’re taking a deep dive into chapter five on Hybrid...

The way most people operate online these days, what would you even consider private anymore? We are so quick to share details about our job,...

The newfound popularity of the internet in the nineties spurned an obsession with hacking. Unfortunately, most movies believed that it wasn'...

Okay, look, we know you plan on reading the entire 2021 MDDR at some point. But you're busy. Life gets in the way. We get it. Who has the ti...

What would you say is the most personal possession that you own? Most would say their cell phone... unless you still have a few journals fro...

You're back home celebrating the holidays with friends and family, sharing stories, catching up, and discussing your plans for the year ahea...

Do you have a data science or engineering background? If so, you're in luck. If not, you're also in luck because today's guest found a way t...

Juan Hardoy leads an international team of investigators, analysts, and lawyers inside the Digital Crimes Unit who share a joint mission to...

Have you ever thought about a career in threat intelligence or cyber security? Possibly finishing school with a degree in computer programmi...

It's finally Friday. You successfully made it through another week and the weekend is so close you can taste it. You pour yourself a bowl of...

Picture this: you’re working on a new software that will revolutionize your industry. You’ve got your work cut out for you, from design to p...

Electricity is all around us. In fact, you’re using it to read this right now. It powers (no pun intended) our everyday lives, and it works...

8 trillion. It’s kind of a big number, right? That’s how many signals are collected, processed, and analyzed by Microsoft’s security team ev...

How likely are you to fall for a scam? Survey Says… depends on your demographic. Scammers are evolving, from cold calls on the phone, to com...

Every occupation has its unique jargon that allows professionals to speak their own language and understand each other’s shorthand. Those of...

Ready for a riddle? What do 40 hypothetical high school students and our guest on this episode have in common? Why they can help you underst...

There used to be a time when our appliances didn’t talk back to us, but it seems like nowadays everything in our home is getting smarter. Sm...

Is it just me, or do you also miss the good ole days of fraudulent activity? You remember the kind I’m talking about, the emails from prince...

How does that old saying go? Keep your friends close and keep your understanding of a threat actor’s underlying behavior and functionality o...

We’ve all had a family dinner, Netflix binge, or otherwise relaxing moment ruined by a telemarketer trying to sell you something you didn't...

We’re formally sending out a petition to change the phrase “Jack of all trades” to “Hyrum of all trades” in honor of this episode’s guest, H...

It’s an all out offensive on today’s episode while we talk about how the best defense is a good offense. But before we plan our attack, we n...

It’s our 30th episode! And in keeping with the traditional anniversary gift guide, the 30th anniversary means a gift of pearls. So from us t...

On this week’s Security Unlocked we’re featuring for the second and final time, a special crossover episode of our sister-podcast, Security...

Threat actors are pesky and, once again, they’re up to no good. A new methodology has schemers compromising online forms where users submit...

On this week’s Security Unlocked, we’re pulling a bait and switch! Instead of our regularly scheduled programming, we’re going to be featuri...

Remember the good ole days when we spent youthful hours playing hide and seek with our friends in the park? Well it turns out that game of h...

Anyone who’s ever watched boxing knows that great reflexes can be the difference between a championship belt and a black eye. The flexing of...

All of us have seen – or at least, are familiar with – the antics of Tom and Jerry or Road Runner and Wile E. Coyote. In each one the coyote...

Throughout the course of this podcast series, we’ve had an abundance of great conversations with our colleagues at Microsoft about how they’...

How many languages do you speak? The average person only speaks one or two languages, and for most people that’s plenty because even as comm...

For Women’s History Month, we wanted to share the stories of just a few of the amazing women who make Microsoft the powerhouse that it is. T...

Every day there are literally billions of authentications across Microsoft – whether it’s someone checking their email, logging onto their X...

If you use email, there is a good chance you’re familiar with email scams. Who hasn’t gotten a shady chain letter or suspicious offer in the...

Today is International Women’s Day, and we are celebrating with a very special episode of Security Unlocked. Hosts Nic Fillingham and Natali...

Digital crime-fighter Donal Keating revisits the podcast, but this time… it’s personal. *cue dramatic crime-fighting music* The Director of...