Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
Technology
History
About Us
Contact Us
Copyright
© 2024 PodJoint
Podjoint Logo
US
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/dd/c7/92/ddc79215-a71a-cad1-9010-2af1223fb095/mza_6860227473276757786.jpg/600x600bb.jpg
Cyber Pulse
National Cryptologic Foundation
15 episodes
1 day ago
Cyber Pulse is the go-to source for deep dives into the most pressing issues in cyber and cybersecurity today. We pulse-check the heartbeat of the cyber world, delivering expert insights, thought-provoking discussions, and actionable takeaways to apply directly to your work and life. Whether a seasoned cybersecurity professional, an academic, or just starting to explore the world of cyber, if you're passionate about cybersecurity, intrigued by the evolving landscape of cyber threats, or want to stay ahead of the curve in this fast-paced digital world, Cyber Pulse is the place for you.
Show more...
Technology
RSS
All content for Cyber Pulse is the property of National Cryptologic Foundation and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Cyber Pulse is the go-to source for deep dives into the most pressing issues in cyber and cybersecurity today. We pulse-check the heartbeat of the cyber world, delivering expert insights, thought-provoking discussions, and actionable takeaways to apply directly to your work and life. Whether a seasoned cybersecurity professional, an academic, or just starting to explore the world of cyber, if you're passionate about cybersecurity, intrigued by the evolving landscape of cyber threats, or want to stay ahead of the curve in this fast-paced digital world, Cyber Pulse is the place for you.
Show more...
Technology
https://d3t3ozftmdmh3i.cloudfront.net/staging/podcast_uploaded_nologo/42036520/42036520-1726847326038-01e78d4f830bc.jpg
Attackers Accidentally Self Pwn with Huntress
Cyber Pulse
11 minutes 58 seconds
1 month ago
Attackers Accidentally Self Pwn with Huntress

Welcome to Cyber Pulse episode 14!


Welcome back to Cyber Pulse. Today we're diving deep into one of the most fascinating cybersecurity incidents of 2025 – a threat actor installed Huntress EDR on their own attack infrastructure.


In this episode we talk about EDR, cyber-criminals, what was revealed, attacker research, AI use in cyber attacks, and how we can better defend going forward
:
- Huntress Blog: "Rare Look Inside Attacker Operation"
- Infosecurity Magazine: "Threat Actor Accidentally Exposes AI-Powered Operations"
- Technical Tools Mentioned:▪ Huntress EDR Platform
- Censys (censys.io)
- Evilginx Framework
- ROADtools Token eXchange
- Make.com Automation Platform
- LunaProxy/Nstbrowser Residential Proxies


Never miss an episode by signing up for our podcast newsletter at: https://cryptologicfoundation.org/community/cyberpulse-subscribe.html


Send us your questions and episode suggestions at: https://cryptologicfoundation.org/community/cyberpulse-questions-suggestions.html

Cyber Pulse
Cyber Pulse is the go-to source for deep dives into the most pressing issues in cyber and cybersecurity today. We pulse-check the heartbeat of the cyber world, delivering expert insights, thought-provoking discussions, and actionable takeaways to apply directly to your work and life. Whether a seasoned cybersecurity professional, an academic, or just starting to explore the world of cyber, if you're passionate about cybersecurity, intrigued by the evolving landscape of cyber threats, or want to stay ahead of the curve in this fast-paced digital world, Cyber Pulse is the place for you.