Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

Adversary Universe Podcast

#170
Language: en Technology News

Activity Overview

Episode publication activity over the past year

Last Checked: 2025-12-08 05:10:26.711

Defrosting Cybersecurity’s Cold Cases with CrowdStrike’s Tillmann Werner

04 Dec 2025

Contributed by Lukas

Not all cybercrimes are resolved. Some threat groups disappear completely, and some malware is never...

Prompted to Fail: The Security Risks Lurking in DeepSeek-Generated Code

20 Nov 2025

Contributed by Lukas

CrowdStrike research into AI coding assistants reveals a new, subtle vulnerability surface: When Dee...

Extortion Rises and Nation-State Activity Intensifies: The CrowdStrike 2025 European Threat Landscape Report

06 Nov 2025

Contributed by Lukas

Europe is a prime target for global adversaries. There is a strong emphasis on eCrime across the reg...

Thriving Marketplaces and Regional Threats: The CrowdStrike 2025 APJ eCrime Landscape Report

23 Oct 2025

Contributed by Lukas

In the Asia Pacific and Japan (APJ) region, a burgeoning set of threat actors is emerging with a dif...

A Brief History of Ransomware

16 Oct 2025

Contributed by Lukas

Ransomware is not new, but the ransomware of today is very different from the ransomware of 1989. To...

Tech Sector Targeting, Innovation Race, Fal.Con Countdown

12 Sep 2025

Contributed by Lukas

This week’s episode arrives as Adam and Cristian are gearing up for Fal.Con, CrowdStrike’s annua...

Live at Black Hat: What’s AI Really Capable Of?

18 Aug 2025

Contributed by Lukas

This year at Black Hat, the topic of AI was everywhere — from hallway chats to the expo floor. Ada...

Cloud Intrusions Rise, eCrime Thrives, Governments Under Attack: CrowdStrike 2025 Threat Hunting Report

04 Aug 2025

Contributed by Lukas

In the first half of 2025 alone, cloud intrusions were up 136% compared to all of 2024. China was a ...

The Return of SCATTERED SPIDER

17 Jul 2025

Contributed by Lukas

They never really left — they just got quieter, faster, and bolder. In this episode of the Adversa...

Ask Us (Almost) Anything: Threat Intel, Adversaries, and More

03 Jul 2025

Contributed by Lukas

You asked, and we answered. This episode of the Adversary Universe podcast takes a deep dive into qu...

When the Adversary Shows Up in Person

19 Jun 2025

Contributed by Lukas

Physical security and IT security have gone hand in hand for a long time. While cybersecurity teams ...

Where AI Fits in the Adversary’s Toolbox

05 Jun 2025

Contributed by Lukas

Would you rather have an adversary profile you based on your AI chat history or tell your AI chatbot...

Catching Up on Cloud Attack Paths with Cloud Threat Specialist Sebastian Walla

28 May 2025

Contributed by Lukas

Today’s adversaries are increasingly operating in the cloud — and Sebastian Walla, Deputy Manage...

Inside the CrowdStrike 2025 Latin America Threat Landscape Report

08 May 2025

Contributed by Lukas

Latin America has become a hotspot for cyber activity. Threat actors around the world, particularly ...

OCULAR SPIDER and the Rise of Ransomware-as-a-Service

10 Apr 2025

Contributed by Lukas

Ransomware has become more difficult for organizations to defend against, but easier for adversaries...

Meet LUNAR SPIDER: The Inner Workings of an eCrime Adversary

27 Mar 2025

Contributed by Lukas

To anticipate threat actors’ behavior, we must understand them. That’s why CrowdStrike closely t...

NSOCKS: Insights into a Million-Dollar Residential Proxy Service

13 Mar 2025

Contributed by Lukas

When an adversary wants to target an organization, they want to make it look like they’re coming f...

China’s Cyber Enterprise Grows: CrowdStrike 2025 Global Threat Report

27 Feb 2025

Contributed by Lukas

China’s cyber enterprise is rapidly growing: China-nexus activity was up 150% across industries in...

A Deep Dive into DeepSeek and the Risks of Foreign LLMs

20 Feb 2025

Contributed by Lukas

DeepSeek took the internet by storm earlier this year, making headlines and sparking conversations a...

Putting a Spotlight on Energy Sector Threats with Corelight's Greg Bell

06 Feb 2025

Contributed by Lukas

Cyberattacks targeting critical infrastructure have made more headlines in recent years, sparking co...

See You I-Soon: A Peek at China’s Offensive Cyber Operations

16 Jan 2025

Contributed by Lukas

“It would not be an understatement to say that China is the number one national security concern t...

The Most Prolific Adversaries and Threats of 2024

19 Dec 2024

Contributed by Lukas

It has been another busy year for defenders and adversaries alike. As we wrap up 2024, Adam and Cris...

Cross-Domain Attacks: Know Them, Find Them, Stop Them

12 Dec 2024

Contributed by Lukas

Adversaries have realized their time-honored attack methods involving clunky malware and malicious a...

LIMINAL PANDA and the Implications of Global Telco Targeting

27 Nov 2024

Contributed by Lukas

On Nov. 19, 2024, Adam testified in front of the U.S. Senate Judiciary Subcommittee on Privacy, Tech...

Exploring Offensive Security with CrowdStrike Red Teamers

07 Nov 2024

Contributed by Lukas

If a business wants to know what an adversary might be capable of, they can seek the help of a red t...

The Latest in China-Taiwan Cyber Tensions

24 Oct 2024

Contributed by Lukas

China and Taiwan have a long history of geopolitical tension that has evolved from land and sea to c...

How CrowdStrike Tracked INDRIK SPIDER from Origin to Takedown

10 Oct 2024

Contributed by Lukas

On Oct. 1, 2024, an international law enforcement coalition announced the disruption of a senior mem...

Small But Mighty: The Kernel’s Essential Role in Cybersecurity Defense

01 Oct 2024

Contributed by Lukas

The kernel is the brain of the operating system. It controls everything that happens on a computer a...

Coming Soon to Las Vegas: Adversary Universe Previews #FalCon2024

12 Sep 2024

Contributed by Lukas

Next week marks the start of Fal.Con 2024. CrowdStrike’s annual conference brings together cyberse...

Intern Spotlight: Starting A Cyber Career with CrowdStrike

29 Aug 2024

Contributed by Lukas

For students aspiring to work in cybersecurity, sitting in a classroom isn’t enough to gain the sk...

Hunting the Rogue Insiders Operating for FAMOUS CHOLLIMA

21 Aug 2024

Contributed by Lukas

FAMOUS CHOLLIMA, a new adversary CrowdStrike is tracking, has recently made headlines for its inside...

Talking OT Security with Fernando Madureira, Global CISO of Cosan

11 Jul 2024

Contributed by Lukas

Where in the world are Adam and Cristian? In this episode, they’re coming to you live from São Pa...

How Adversaries Respond to Law Enforcement Takedowns

27 Jun 2024

Contributed by Lukas

What happens when there is a takedown of a major cybercriminal group or law enforcement activity has...

When the Adversary Knows They’re Caught

13 Jun 2024

Contributed by Lukas

How do adversaries react when they know they’re being tracked? How do they respond to organization...

Unpacking China-India Cyber Tensions

30 May 2024

Contributed by Lukas

What happens when two cyber superpowers — and the most populous countries in the world — target ...

Understanding Social Engineering with Shelly Giesbrecht, Director, Professional Services

23 May 2024

Contributed by Lukas

Social engineering is not a new threat — adversaries have long used psychological manipulation to ...

Hacktivism and the JACKALs Behind It

09 May 2024

Contributed by Lukas

The rise of hacktivism — the use of hacking techniques to make a statement supporting a political ...

Building a Strong Threat Hunting Program with Andrew Munchbach

25 Apr 2024

Contributed by Lukas

Organizations fear adversaries will attack. Threat hunters assume adversaries are already in the sys...

Adversary Attribution: What It Means and How It Works

11 Apr 2024

Contributed by Lukas

Today’s conversation explores a common question around adversary activity: Why does attribution ma...

LIVE from Gov Threat Summit: A Chat with Morgan Adamski, Chief of the NSA’s Cybersecurity Collaboration Center

28 Mar 2024

Contributed by Lukas

The National Security Agency’s Cybersecurity Collaboration Center (CCC) was created based on a gro...

CrowdStrike CSO Shawn Henry on Election Security, Nation-State Threats and His FBI Career

14 Mar 2024

Contributed by Lukas

CrowdStrike Chief Security Officer Shawn Henry joined CrowdStrike as employee number 19 after a 24-y...

A Human at the Keyboard: CrowdStrike Reports 60% Jump in Interactive Intrusions

22 Feb 2024

Contributed by Lukas

The days of automated cyberattacks are dwindling: last year CrowdStrike saw a 60% jump in interactiv...

The Dark Personality Traits Fueling Cybercrime

15 Feb 2024

Contributed by Lukas

CrowdStrike has long said, “You don’t have a malware problem — you have an adversary problem.”...

Demystifying North Korea: Why the "Hermit Kingdom" Is a Cyber Threat to Watch

01 Feb 2024

Contributed by Lukas

Though the inner workings of North Korea remain a mystery to much of the world, its global cyber act...

AI Through the Defender’s Lens: A Chat with CrowdStrike’s Global CTO

18 Jan 2024

Contributed by Lukas

Cristian is joined by CrowdStrike Global CTO Elia Zaitsev to revisit the world of AI and large langu...

Inside Russia’s Laboratory of Cyber Operations — and Beyond

11 Jan 2024

Contributed by Lukas

In mid-December 2023, an adversary CrowdStrike tracks as VOODOO BEAR targeted Ukrainian telecom prov...

Adversary Universe: 2023 Highlights

28 Dec 2023

Contributed by Lukas

It has been a whirlwind year for the cybersecurity industry. In this episode of the Adversary Unive...

Inside the ”Alphabet Soup” of Incident Reporting Regulations

14 Dec 2023

Contributed by Lukas

Organizations around the world must navigate a growing number of cyber incident reporting regulation...

Data Extortion Dethrones Ransomware as the Threat to Watch

30 Nov 2023

Contributed by Lukas

Today’s adversaries are working smarter, not harder — and it’s clear in the way their tactics ...

Urgent Care Required: The State of Healthcare Cybersecurity

16 Nov 2023

Contributed by Lukas

At a time when breaches make headlines daily, the healthcare sector is among the most popular advers...

Iran’s Rise from Nascent Threat Actor to Global Adversary

09 Nov 2023

Contributed by Lukas

“Iran’s digital presence is something we don’t want to underestimate.” Though its cyber act...

Inside China’s Evolution as a Global Security Threat

02 Nov 2023

Contributed by Lukas

China is the source of some of the most prolific and aggressive nation-state cyber activity organiza...

Have You Been Breached?

19 Oct 2023

Contributed by Lukas

A cyberattack is any security team’s worst nightmare — but the earlier a breach is detected, the...

The Rise of the Access Brokers

05 Oct 2023

Contributed by Lukas

When an adversary seeks entry into an organization, they no longer need to develop their own vulnera...

Inside the AI, Cloud and Platform Innovations Previewed at Fal.Con 2023

29 Sep 2023

Contributed by Lukas

Adversaries are moving and innovating at a rapid pace — but so are we. In this bonus episode, Ada...

Adversaries and AI: Today’s Reality and Tomorrow’s Potential

21 Sep 2023

Contributed by Lukas

Artificial intelligence. It’s the hot topic in cybersecurity today. Everyone is curious about it,...

Ransomware Actors Mark Their Calendars for Back-to-School

07 Sep 2023

Contributed by Lukas

School is back in session — and adversaries have already done their homework. They know education...

Invisible Threats: Discovering, Tracking and Mitigating Vulnerabilities

24 Aug 2023

Contributed by Lukas

Vulnerabilities are the unlocked doors allowing adversaries a foothold into your organization. Left...

Intel-Led Threat Hunting with CrowdStrike Counter Adversary Operations

10 Aug 2023

Contributed by Lukas

“Scary and incredible.” “Terrifying.” Adam and Cristian dig into new data from CrowdStrike’...

Is Microsoft’s Monoculture a National Security Risk?

03 Aug 2023

Contributed by Lukas

Multiple U.S. government agencies were recently breached after adversaries exploited vulnerabilities...

Cloud is the New Battleground

27 Jul 2023

Contributed by Lukas

Most organizations rely on cloud services or infrastructure to power their day-to-day operations —...

Who is the Adversary?

13 Jul 2023

Contributed by Lukas

Behind every cyberattack, there is an adversary. These adversaries target organizations large and sm...

Adversary Universe Podcast Trailer

28 Jun 2023

Contributed by Lukas

Welcome to the Adversary Universe podcast, the best place to learn about the threat actors behind to...