All Episodes
Microsoft Threat Intelligence Podcast — 67 episodes
Ransomware: From Isolated Attacks to Global Criminal Ecosystem
Winter SHIELD: Closing the Security Control Gap
AI as Tradecraft: How Threat Actors Are Operationalizing AI
AI Recommendation Poisoning: When Optimization Becomes Manipulation
Unpacking the Latest Threats Targeting the Financial Services Industry
Fact vs Hype: How Threat Actors Are Really Using AI Right Now
Open SesameOp: Abusing trusted AI platforms to host a C2 server
Whisper Leak: How Threat Actors Can See What You Talk to AI About
The Grid, a Digital Frontier: E-ISAC on Securing the Power Grid
Ahoy! A Tale of Payroll Pirates Who Target Universities
Beyond AI for Security Hype: What Really Matters in Cyber Defense
The New Frontlines of Cybersecurity: Lessons from the 2025 Digital Defense Report
Threat Landscape Update: Ransomware-as-a-Service and Advanced Modular Malware
Stopping Domain Impersonation with AI
Click, Call, Compromise: Inside the Latest Loader Campaigns
Live from Black Hat: Ransomware, Responsible Disclosure, and the Rise of AI
How Microsoft Stays Ahead of the World’s Most Dangerous Hackers
Inside Microsoft’s Global Operation to Disrupt Lumma Stealer’s 2,300-Domain Malware Network
Tips from Grifter and Lintile for Attending Hacker Summer Camp
The Art and Science of Microsoft’s Red Team
A Peek Inside Microsoft’s Global Fight Against Cyber Threats
Call of the Cyber Duty (A Global Cyber Challenge)
BadPilot: Inside Seashell Blizzard’s (AKA Sandworm) Global Cyber Espionage Campaign
Inside THOR Collective, a Dispersed Team Delivering Open-Source Research
Star Blizzard Shifts Tactics to Spear-Phishing on Whatsapp
Microsoft’s 50th Anniversary: Security Then and Now
The Professionalization of the Ransomware Criminal Ecosystem
Malvertising Campaign Leads to Info Stealers Hosted on Github
A Blizzard Is Impacting NATO and Ukraine – The Latest on Russian Cyber Threats
Microsoft’s CVP of Fraud on Combating Ecosystem Abuse
Seashell Blizzard Ramping Up Operations and OSINT Trends of DPRK Threat Actors
Threat Landscape Update: North Korean IT Workers, OSINT, and Remote Monitoring and Management Abuse
Doctors’ Perspective: The Rise of Healthcare Ransomware
A Couple of Rats Pick Up New Tricks, Un Proposes Cybercrime Treaty
Between Two Gregs: An Update on the North Korean Threat Landscape
Microsoft’s Yonatan Zunger on Red Teaming Generative AI
Vanilla Tempest: The Threat Actor Behind Recent Hospital Ransomware Attacks
Gingham Typhoon’s Cyber Expansion Into the South Pacific
The Inside Scoop on Using KQL for Cloud Data Security
Citrine and Onyx Sleet: An Inside Look at North Korean Threat Actors
Black Basta and the Use of LLMs by Threat Actors
Disrupting Cracked Cobalt Strike
Behind the Scenes at Blue Hat IL: Security Advancements and Challenges
Hunting for AI Bug Bounty
Microsoft Live at the RSA Conference 2024
Mark Russinovich Talks Jailbreaks
Threat Landscape Update on Grandoreiro and Luna Tempest
Andrew Morris and Lauren Proehl on Infosec
Behind the Scenes of the XZ vuln with Andres Freund and Thomas Roccia
Paul Melson talks ScumBots
Microsoft Secure in San Francisco
Live from New York it’s Microsoft Secure
Data Science for Security
Throwing Darts in the Dark With Microsoft Incident Response
Iran’s Influence Operations
Mobile Threat Landscape Update
North Korea Threat Landscape Update
Microsoft Ignite Special Edition
A Journey through Cyberwarcon
Threat Landscape with Wes Drone
Punching Miscreants with Jack Mott
Octo Tempest Threat Actor Profile
China Threat Landscape: Meet the Typhoon
Exploring Mobile Threats
Incident Response with Empathy
Peach Sandstorm
The Microsoft Threat Intelligence Podcast - Trailer