Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
SpyCast, the official podcast of the International Spy Museum, is a journey into the shadows of international espionage. Each week, host Sasha Ingber brings you the latest insights and intriguing tales from spies, secret agents, and covert communicators, with a focus on how this secret world reaches us all in our everyday lives. Tune in to discover the critical role intelligence has played throughout history and today. Brought to you from Airwave, Goat Rodeo, and the International Spy Museum ...
…
continue reading
Bi-Weekly Cyber intellgence briefing, each episode includes update regrading some of the latest events happened in the cyber security world. This podcast is meant for people who wants to listen to a short (5 minute) overview about some of the latest events happened lately in the cyber world. The Podcast is not getting into technical details and anyone can understand.
…
continue reading
Powered by Startuprad.io™ | Global Top 20 Entrepreneurship Podcast Security Sutra is your tactical briefing on the frontline of cybersecurity innovation. As a sub-podcast of Startuprad.io™, this show explores how startups defend themselves, scale securely, and lead the charge against global cyber threats—with a special focus on Germany, Austria, and Switzerland (DACH/GSA region). 🎙️ Hosted in English for a global audience, Security Sutra brings together cybersecurity founders, ethical hacker ...
…
continue reading

1
Lethal Dissent: Iran’s Spy Games in Turkey
29:56
29:56
Play later
Play later
Lists
Like
Liked
29:56Washington and Tehran have a long and complicated history, with tensions that rise, fall and then rise again. Just this summer, we watched the U.S. and Israel strike Iran’s nuclear infrastructure. This month, SpyCast is bringing you a series of special episodes on Iran, looking back and forward, to unveil the country’s intelligence priorities, capa…
…
continue reading

1
Why Startup Exec Hires Fail — Avoid €250K Mistakes with Diagnostic Hiring
29:20
29:20
Play later
Play later
Lists
Like
Liked
29:20What if every second leadership hire in your startup fails — costing you up to €250,000? In this episode of Startuprad.io, we uncover why so many startup executive hires flop and how diagnostic hiring is rewriting the rules of leadership selection. What You'll Learn: Why more than 50% of startup VP and C-level hires fail within 18 months The real-w…
…
continue reading

1
Agent 202: New secrets emerge on an American who spied for Cuba
30:32
30:32
Play later
Play later
Lists
Like
Liked
30:32Codenamed "Agent 202," Kendall Myers went undetected as a spy for Cuba for nearly 30 years. He worked at the State Department’s Foreign Service Institute, secretly spying for Cuba out of an earnest love for the island, its people, and their leader Fidel Castro. Myers was caught in 2009, after he retired. State Department Security Specialist and for…
…
continue reading

1
CYFIRMA Research: EdskManager RAT- Multi-Stage Malware with HVNC and Evasion Capabilities
5:15
5:15
Play later
Play later
Lists
Like
Liked
5:15CYFIRMA research provides an analysis of a newly identified Remote Access Trojan, EdskManager RAT, which exhibits stealthy infection mechanisms and covert control using HVNC. Key Capabilities: · Multi-stage infection using signed binaries and encrypted config · HVNC-based hidden window interaction · Browser extension profiling (Chrome, Edge, Brave)…
…
continue reading

1
Agent of Chaos: The Austrian Fugitive Running Russia’s Global Spy Networks
31:24
31:24
Play later
Play later
Lists
Like
Liked
31:24Today he’s one of the most wanted men in the world, but before Jan Marsalek fled to Russia, he was the COO of payment-processing firm Wirecard. Officials and investigators say Marsalek used the company to finance Moscow’s covert operations and spy networks in Africa and Europe. In 2020, nearly €2 billion vanished from Wirecard, along with Marsalek.…
…
continue reading

1
CYFIRMA Research: CVE-2025-5777– Pre-Auth Memory Leak in Citrix NetScaler (CitrixBleed 2)
5:00
5:00
Play later
Play later
Lists
Like
Liked
5:00Critical Alert: CVE-2025-5777 – Pre-Auth Memory Leak in Citrix NetScaler (CitrixBleed 2)! Organizations relying on Citrix NetScaler ADC and Gateway for secure remote access must act immediately. This newly uncovered vulnerability allows unauthenticated attackers to leak sensitive memory—including session tokens—by sending malformed authentication r…
…
continue reading
CYFIRMA exposes Octalyn Forensic Toolkit, a malicious GitHub-hosted tool masquerading as a legitimate forensic utility. In reality, it functions as a credential stealer with Telegram-based C2, targeting browser data, crypto wallets, Discord, and VPN configs. Built with Delphi and C++, Octalyn enables even low-skilled actors to exfiltrate sensitive …
…
continue reading

1
Finance Automation for SMEs: Moss CEO on Scaling, AI & Fintech Lessons
48:41
48:41
Play later
Play later
Lists
Like
Liked
48:41What if finance wasn’t a bottleneck but your secret growth weapon? Moss CEO Ante Spittler joins Startuprad.io to reveal how his Berlin fintech is helping over 5,000 SMEs automate spend, ditch spreadsheets, and scale smarter. What You'll Learn: How Moss raised €180M and scaled to process €5B+ annually The biggest finance automation challenges for Eu…
…
continue reading

1
CYFIRMA Research- Tracking Ransomware- June 2025
4:54
4:54
Play later
Play later
Lists
Like
Liked
4:54Stay ahead with CYFIRMA’s Monthly Ransomware Report – June 2025. June saw 463 ransomware victims globally, a 15% decline from May. Qilin led the threat landscape, exploiting Fortinet flaws and adding legal pressure tactics. New players like Fog and Anubis adopted stealthy, modular toolkits and file-wipers for maximum damage. Emerging groups Teamxxx…
…
continue reading

1
From Intel Officer to White House Adviser: A Chat with The Museum’s Executive Director
33:03
33:03
Play later
Play later
Lists
Like
Liked
33:03This week we spoke with the International Spy Museum's Executive Director, Colonel Chris Costa. His decades-long career in the intelligence community spanned multiple continents, running sensitive operations in Panama, Bosnia, Iraq, and Afghanistan, where he earned two Bronze stars for his human intelligence contributions. Later, Costa advised Navy…
…
continue reading

1
CYFIRMA Research- RENDERSHOCK- Weaponizing Trust in File Rendering Pipelines
5:58
5:58
Play later
Play later
Lists
Like
Liked
5:58New Threat Model: Zero-Click Compromise via File Rendering Automation RenderShock introduces a powerful new attack framework that leverages trusted file previewing, indexing, and sync mechanisms to trigger payloads — without exploits, macros, or even opening the file. Key Highlights: Zero-click execution using passive system features. Payloads deli…
…
continue reading

1
CYFIRMA Research- GitHub Abused to Spread Malware Disguised as Free VPN
5:19
5:19
Play later
Play later
Lists
Like
Liked
5:19CYFIRMA Research's latest report explores a fake "Free VPN for PC" app hosted on GitHub, delivering a packed DLL payload using obfuscated Base64 hidden in junk strings. It uses P/Invoke to load a hidden DLL, executes GetGameData, and injects into legit processes like MSBuild.exe. Packed, evasive, and anti-debug. Link to the Research Report: https:/…
…
continue reading

1
Why Emotional Branding Is the Startup Superpower You’re Ignoring | Jakob Trpin
29:30
29:30
Play later
Play later
Lists
Like
Liked
29:30Your startup isn’t failing because of your tech or funding—it’s because people don’t feel your brand. In this episode, Jakob Trpin, founder of Yesyesandtwo, breaks down why emotional branding is the hidden growth engine for startups. Discover how subconscious branding cues, human-to-human marketing (H2H), and internal culture alignment create trust…
…
continue reading

1
“America’s Gatekeeper”: A Conversation with DCSA’s Director David Cattler
29:00
29:00
Play later
Play later
Lists
Like
Liked
29:00Born out of a major Chinese cyberattack that stole personal information from millions of federal government employees, the Defense Counterintelligence and Security Agency calls itself ‘America’s Gatekeeper.’ Now five years into its existence, it’s responsible for overseeing most of the security clearances for government personnel and contractors. D…
…
continue reading

1
CYFIRMA Research- Phishing Attack: Deploying Malware on Indian Defense BOSS Linux
3:20
3:20
Play later
Play later
Lists
Like
Liked
3:20CYFIRMA uncovers a sophisticated phishing campaign by APT36 (Transparent Tribe) leveraging Linux-specific malware on BOSS Linux systems (widely used by Indian government agencies). Attackers use malicious .desktop files to deploy stealthy ELF binaries while distracting users with fake PowerPoint files. Stay vigilant and safeguard critical infrastru…
…
continue reading

1
Helsing, Luma, and EU Billions: DACH Startup Funding 2025 Unleashed
38:05
38:05
Play later
Play later
Lists
Like
Liked
38:05What happens when Germany creates its second decacorn and the EU drops €10B to scale startups? This month’s news episode breaks it all down — from funding explosions in deep tech to the future of biotech, fintech innovation, and defense AI. The DACH startup scene has never been this hot. What You'll Learn Why Helsing dethroned Celonis to become Ger…
…
continue reading
12-Day War update: Israel and Iran agree to a fragile ceasefire after America's bombing run on Tehran's nuclear facilities. Link to the Research Report: https://www.cyfirma.com/research/12-day-war-update/ #OperationRisingLion #MidnightHammer #IsraelIran #Geopolitics #CYFIRMAResearch #ThreatIntelligence #cybersecurity #ETLM #currentaffairs #MiddleEa…
…
continue reading

1
Russia's Fake Identity Assembly Line in Brazil
31:44
31:44
Play later
Play later
Lists
Like
Liked
31:44When a Russian spy was arrested in Brazil in 2022, authorities were shocked to discover that he seemed to have a real birth certificate and authentic citizenship documents. The incident sparked a multi-year investigation that uncovered a network of Russian operatives living and working in Brazil – Their false identities supported by genuine documen…
…
continue reading
Odyssey Stealer, a rebranded version of Poseidon Stealer, targets macOS users through the Clickfix technique—tricking victims into copy-pasting malicious scripts into their terminal. With capabilities to steal hardware details, keychains, browser cookies, crypto wallets, and plugins, the stolen data is sent to the stealer's hosted infrastructure. D…
…
continue reading

1
Breaking the Silence: Coming Out in the CIA
32:42
32:42
Play later
Play later
Lists
Like
Liked
32:42Emerging alongside Joseph McCarthy’s Red Scare in the 1950s was the Lavender Scare: Widespread panic and paranoia over the inclusion of gay personnel in the federal government. Their perceived dangers led to the terminations and forced resignations of thousands. Fast forward to 1988 – Tracey Ballard, who worked at the CIA, headed in to take a polyg…
…
continue reading

1
CYFIRMA Research- APT36 Phishing Campaign Targets Indian Defense Using Credential-Stealing Malware
6:36
6:36
Play later
Play later
Lists
Like
Liked
6:36Cyber Threat Alert: APT36 Targets Indian Defense with a Sophisticated Phishing Campaign! CYFIRMA has uncovered a targeted cyber-espionage operation by APT36 (Transparent Tribe), a Pakistan-based threat actor. This group is exploiting phishing emails embedded with malicious PDFs mimicking official NIC documents to infiltrate Indian defense systems. …
…
continue reading

1
CYFIRMA Research- Tracking Ransomware: May 2025
4:04
4:04
Play later
Play later
Lists
Like
Liked
4:04Stay ahead of evolving ransomware threats with CYFIRMA’s May 2025 Ransomware Report. May witnessed a 15.95% spike in ransomware attacks compared to April, with 545 incidents logged globally. New actors like SafePay and SilentRansomGroup rapidly gained ground, while established groups like Qilin deployed advanced loaders like NETXLOADER and SmokeLoa…
…
continue reading

1
A Conversation with House Permanent Select Committee on Intelligence Chairman
32:56
32:56
Play later
Play later
Lists
Like
Liked
32:56What should the US Intelligence Community prioritize domestically and overseas, and how should the work be done? We sat down with Congressman Rick Crawford, Chairman of the House Permanent Select Committee on Intelligence, to learn his perspective on these questions. The conversation emphasized the growing threat of China’s influence in the West, t…
…
continue reading

1
CYFIRMA Research: Understanding CyberEye RAT Builder- Capabilities and Implications
5:30
5:30
Play later
Play later
Lists
Like
Liked
5:30CYFIRMA’s latest research report analyses a stealthy Windows-based malware known as CyberEye, which is posing a significant threat across systems by offering attackers full remote control through a Telegram Bot API. Once executed, it silently harvests browser-stored passwords, cookies, credit card details, Wi-Fi credentials, and session tokens from…
…
continue reading

1
CYFIRMA Research: Ukraine's Attack on Russia's Strategic Air Force- Live Feed from Revolution in Military Affairs
8:35
8:35
Play later
Play later
Lists
Like
Liked
8:35Ukraine’s daring drone strike reshapes warfare! CYFIRMA’s research team examines how cheap tech took on Russia’s nuclear air force and what it means for global militaries. Link to the Reseach Report: https://www.cyfirma.com/blogs/ukraines-attack-on-russias-strategic-air-force-live-feed-from-a-revolution-in-military-affairs/ #Geopolitics #ThreatInte…
…
continue reading

1
CYFIRMA Research: DuplexSpy RAT- A Stealthy Windows Malware Enabling Full Remote Control and Surveillance
6:14
6:14
Play later
Play later
Lists
Like
Liked
6:14A highly modular Windows Remote Access Trojan (RAT), DuplexSpy, written in C#, has surfaced with advanced surveillance and system control capabilities. Features include keylogging, remote shell access, screen & webcam spying, audio eavesdropping, and live C2 chat. It uses fileless execution, UAC bypass, registry persistence, and DLL injection to ev…
…
continue reading

1
Ghost Stories: The Hunt for Russian Spies in the US
31:15
31:15
Play later
Play later
Lists
Like
Liked
31:15In the early 2000s, the FBI uncovered a team of Russian operatives who had been living double lives in the United States. They were posing as professors, journalists, financial planners, real estate and travel agents, all while sending information back to Moscow. Now, 15 years after they were arrested, Alan Kohler, the former Assistant Director of …
…
continue reading

1
CYFIRMA Research: Firewalls and Frontlines- The India-Pakistan Cyber Battlefield Crisis
6:47
6:47
Play later
Play later
Lists
Like
Liked
6:47As tensions between India and Pakistan escalated in early 2025, the conflict spilled into cyberspace. In the wake of the April 22nd Kashmir attack and India’s Operation Sindoor, dozens of hacktivist groups launched a wave of digital assaults — from DDoS attacks and defacements to claimed data breaches — targeting critical infrastructure and governm…
…
continue reading

1
CYFIRMA Research- Versa Concerto: Understanding and Mitigating CVE-2025-34027
4:27
4:27
Play later
Play later
Lists
Like
Liked
4:27Critical Alert: CVE-2025-34027 – Authentication Bypass + RCE in Versa Concerto! Organizations using Versa Concerto for network orchestration must take immediate action. This newly disclosed vulnerability allows unauthenticated attackers to bypass login mechanisms and gain remote code execution through exposed REST APIs. The flaw affects key authent…
…
continue reading

1
The Secret Navy and Their Hunt for a Nazi Sub
33:06
33:06
Play later
Play later
Lists
Like
Liked
33:06How do you catch an enemy’s submarine … and then make it vanish? That’s what the U.S. Navy’s elusive Tenth Fleet planned, as it tracked down Germany’s U-505 submarine. The mission came right before the Allies ran ashore on the beaches of Normandy in World War II. Historian Alexander Rose draws on long classified documents and intercepted transmissi…
…
continue reading
A new ransomware! Lyrix Ransomware targets Windows systems, encrypting files and appending random 10-character extensions. Victims receive a README.txt ransom note demanding payment, threatening to leak stolen data. Strengthen robust defenses & comprehensive incident response now! Link to the Research Report: https://www.cyfirma.com/research/lyrix-…
…
continue reading

1
CYFIRMA Research- While Trump Disrupts World Order China Prepares for War Over Taiwan
11:29
11:29
Play later
Play later
Lists
Like
Liked
11:29Read CYFIRMA’s latest geo-political analysis, regarding Trump’s continued disruption of the world order, calling U.S. alliances into question while an emboldened China prepares for war over Taiwan. Link to the Research Report: https://www.cyfirma.com/research/while-trump-disrupts-the-world-order-china-prepares-for-war-over-taiwan/ #Geopolitics #CYF…
…
continue reading

1
May 2025: AI Unicorns, Mega VC Funds, and Regulation Shakeups in DACH
31:18
31:18
Play later
Play later
Lists
Like
Liked
31:18Startups in the DACH region are heating up — from AI unicorns to VC mega-funds. In this monthly startup news roundup, we unpack the most important trends in Germany, Austria, and Switzerland’s tech ecosystem. Learn how Parloa became Germany’s second unicorn of the year, how Quantum Systems secured €160M to dominate aerial AI, and how the EIB’s €70B…
…
continue reading

1
Negotiate Like the FBI: Sales Psychology for Startup Founders
46:42
46:42
Play later
Play later
Lists
Like
Liked
46:42What happens when an FBI-trained negotiation coach brings elite sales psychology into the startup world? You get a masterclass in influence, integrity, and investor persuasion. Today’s episode of Startuprad.io features Matthias Bullmahn, a crisis negotiation expert, former Accenture executive, and storytelling coach — here to show founders how to n…
…
continue reading

1
How Are Shifting Priorities Impacting National Security in America?
27:18
27:18
Play later
Play later
Lists
Like
Liked
27:18Most Americans would agree that the United States should be protected, but from whom … and how? Dr. Donell Harvin, the former Chief of Homeland Security and Intelligence for the District of Columbia, says the U.S. is taking its eye off the ball - focusing its large domestic intelligence apparatus in a direction that is politically expedient, but no…
…
continue reading

1
CYFIRMA Research: GhostSpy- Web-Based Android RAT
6:08
6:08
Play later
Play later
Lists
Like
Liked
6:08A high-risk Android malware poses a serious threat by targeting banking apps, bypassing screenshot protections through UI reconstruction to steal sensitive financial data. It records live screen activity, captures video, and audio in real time, SMS, Contacts, Call logs, files and silently auto-grants all permissions. Once installed, it takes full c…
…
continue reading

1
Why Europe’s Venture Capital Needs a Mindset Reboot | Andy Goldstein
40:05
40:05
Play later
Play later
Lists
Like
Liked
40:05🎧 Opening: Why do Europe’s startups scale slower than their U.S. counterparts? In this raw, revealing episode, Andy Goldstein uncovers what’s really holding back the European venture capital scene—and what we can do about it. 💡 What You'll Learn: How investor education can radically improve VC decision-making Why German founders hesitate to interna…
…
continue reading

1
Sharing Intelligence: Challenges between US and Ukraine
31:56
31:56
Play later
Play later
Lists
Like
Liked
31:56After Russia’s full scale invasion of Ukraine, the U.S. rushed to create a secret center that set targets for the Ukrainians to destroy. But the counteroffensive of 2023 failed to achieve its goals. So, what went wrong? New York Times reporter Adam Entous spent more than a year reporting on this story. He joins SpyCast host Sasha Ingber to talk abo…
…
continue reading

1
CYFIRMA Research- Tracking Ransomware: April 2025
7:39
7:39
Play later
Play later
Lists
Like
Liked
7:39Stay ahead of evolving ransomware threats with CYFIRMA’s April 2025 Ransomware Report. Last month revealed shifting dynamics—Qilin surged by 71%, while Play and DragonForce increased by 75% and 25% respectively. Despite a 29% drop in total incidents from March, the Manufacturing, IT, and Consumer sectors remained heavily targeted. The U.S. topped t…
…
continue reading

1
How AI Is Transforming Industrial Tech — Visionaries Club’s Bold VC Strategy
56:59
56:59
Play later
Play later
Lists
Like
Liked
56:59Opening What happens when Europe's top startup operators become VCs — and use AI to disrupt billion-euro legacy sectors? Today’s episode uncovers how Marton Sarkadi Nagy, Partner at Visionaries Club, is backing founders who are rewriting the playbook for industrial tech innovation. What You'll Learn: 🔧 How applied AI is replacing legacy SaaS and tr…
…
continue reading
Conflict has been escalating between two nuclear powers–India and Pakistan. It started in April, after India blamed Pakistan for supporting militants who carried out a massacre in Kashmir. President Trump offered to help defuse the tensions.Throughout history, India and Pakistan’s hostility has been documented in the President's Daily Brief, a high…
…
continue reading

1
How Trust-Based Leadership Drives Startup Culture That Scales (2/2)
19:48
19:48
Play later
Play later
Lists
Like
Liked
19:48Most startups talk about culture. But very few measure it. Even fewer know how to scale it. In Part 2 of our interview with Christian Conrad — coach, former Kellogg’s exec, and author of Magical Company Culture — we go deep into the execution side of culture. Forget team-building retreats. Christian outlines a leadership playbook where trust, behav…
…
continue reading

1
CYFIRMA Research- PupkinStealer : A .NET-Based Info-Stealer
4:33
4:33
Play later
Play later
Lists
Like
Liked
4:33CYFIRMA’s latest threat report reveals the workings of PupkinStealer, a .NET-based information stealer designed to extract a focused set of sensitive data from victim systems. Targeting browser credentials, desktop files, Telegram and Discord sessions, and screenshots, the malware compresses all stolen content into a ZIP archive and exfiltrates it …
…
continue reading

1
CYFIRMA Research- EXPLAINER: THE ALGERIA / MOROCCO TENSIONS
7:45
7:45
Play later
Play later
Lists
Like
Liked
7:45Geopolitical tensions between Algeria and Morocco have reignited over the Western Sahara issue. Hacktivist groups have exacerbated the situation by targeting each other’s critical infrastructure. Algerian hacktivists claimed to have breached Morocco's CNSS, while Moroccan hacktivists alleged, they had hacked and leaked data from Algeria's MGPTT. Ho…
…
continue reading

1
Culture Is ROI: How Christian Conrad Builds Magnetic Company Cultures in Startups (1/2`)
48:28
48:28
Play later
Play later
Lists
Like
Liked
48:28Sponsor 👉 Struggling with small biz finances? Tide’s free account + up to €400 cashback makes it a no-brainer: tide.co/Podcastsde – use code STARTUPRADIO 🎧 Opening What if your company culture was your biggest growth engine? In this episode, we dive deep with leadership coach Christian Conrad to unpack what makes startup cultures not only magnetic …
…
continue reading
They were a spy cell like no other — operating from quiet British suburbs, hailing from Bulgaria, and working on behalf of Russia. Their handler dubbed them “The Minions,” and their plots stretched across Europe and spanned honeytraps, abductions, and murder. At the time of this recording, six have been convicted and await sentencing. To parse out …
…
continue reading
A new threat is on the rise - Gunra Ransomware. This sophisticated ransomware not only encrypts files but also exfiltrates sensitive data, threatening to leak the data unless the ransom is paid. Read the latest report from the CYFIRMA research team to learn more! Stay informed and safeguard your systems! Link to the Research Report: https://www.cyf…
…
continue reading

1
CYFIRMA Research- US MANUFACTURING RELOCATION AND THREATS
11:21
11:21
Play later
Play later
Lists
Like
Liked
11:21Donald Trump’s new tariff promises to revive American manufacturing, but evidence shows they are more likely to raise prices, reduce competitiveness, deter investment, and fuel geopolitical instability. The vision of millions of factory jobs ignores automation, labor shortages, and global supply chains. Instead of revitalizing the industry, tariffs…
…
continue reading

1
€1.3B Raised, 1 Fintech Crashes: April 2025 DACH Startup News Breakdown
41:52
41:52
Play later
Play later
Lists
Like
Liked
41:52In April 2025, DACH startups raised over €1.3 billion—while one of Europe’s top fintechs spiraled into crisis. This isn’t just another news roundup. This is your investor-grade, startup-founder-relevant, executive-level briefing from the DACH region’s leading podcast. 🚀 This episode is brought to you by Vanta. Automate your SOC 2, ISO 27001, and GD…
…
continue reading

1
CYFIRMA Research- Hannibal Stealer: A Rebranded Threat Born from Sharp and TX Lineage
8:38
8:38
Play later
Play later
Lists
Like
Liked
8:38Read CYFIRMA’s report on the Hannibal Stealer, a rebranded variant of SHARP and TX Stealers, which has re-emerged with expanded data exfiltration capabilities and an updated command-and-control infrastructure. Hannibal Stealer is built in C# on the .NET framework. It targets a wide range of data sources, including browsers, cryptocurrency wallets, …
…
continue reading