Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
Technology
History
About Us
Contact Us
Copyright
© 2024 PodJoint
Podjoint Logo
US
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/7b/e6/6f/7be66f03-d6e0-1be1-b242-3b3b4033ad99/mza_1691185537253702052.jpg/600x600bb.jpg
The Cyber Riddler
Ahmad Almorabea
28 episodes
1 month ago
Dive into the hidden world of Windows Event Logs — where SOC analysts uncover patterns, trace intrusions, and expose how attackers exploit the very logs meant to catch them. Learn how to spot the signals, build timelines, and stay one step ahead of the breach. X: @almorabeaX: @CyberRiddlerWebsite: https://thecyberriddler.com
Show more...
Technology
RSS
All content for The Cyber Riddler is the property of Ahmad Almorabea and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Dive into the hidden world of Windows Event Logs — where SOC analysts uncover patterns, trace intrusions, and expose how attackers exploit the very logs meant to catch them. Learn how to spot the signals, build timelines, and stay one step ahead of the breach. X: @almorabeaX: @CyberRiddlerWebsite: https://thecyberriddler.com
Show more...
Technology
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/7b/e6/6f/7be66f03-d6e0-1be1-b242-3b3b4033ad99/mza_1691185537253702052.jpg/600x600bb.jpg
Zero-Day Exploits
The Cyber Riddler
11 minutes
1 year ago
Zero-Day Exploits
In this episode of The Cyber Riddler podcast, we venture into the shadowy world of zero-day exploits, one of the most well known threats in the cybersecurity world . Zero-day exploits represent vulnerabilities that can be targeted before they are even known to exist, making them a significant concern for both organizations and individuals. We explore the lifecycle of a zero-day exploit, from discovery and weaponization to delivery and exploitation. Through notable case studies, we illustrate...
The Cyber Riddler
Dive into the hidden world of Windows Event Logs — where SOC analysts uncover patterns, trace intrusions, and expose how attackers exploit the very logs meant to catch them. Learn how to spot the signals, build timelines, and stay one step ahead of the breach. X: @almorabeaX: @CyberRiddlerWebsite: https://thecyberriddler.com