
Insights from recent episode analysis
Audience Interest
Podcast Focus
Publishing Consistency
Platform Reach
Insights are generated by CastFox AI using publicly available data, episode content, and proprietary models.
Most discussed topics
Brands & references
Total monthly reach
Estimated from 4 chart positions in 4 markets.
By chart position
- 🇦🇺AU · Technology#1195K to 30K
- 🇲🇽MX · Technology#1721K to 10K
- 🇦🇪AE · Technology#803K to 10K
- 🇳🇬NG · Technology#200500 to 3K
- Per-Episode Audience
Est. listeners per new episode within ~30 days
4.8K to 27K🎙 ~2x weekly·71 episodes·Last published 5d ago - Monthly Reach
Unique listeners across all episodes (30 days)
9.5K to 53K🇦🇺57%🇲🇽19%🇦🇪19%+1 more - Active Followers
Loyal subscribers who consistently listen
3.8K to 21K
Market Insights
Platform Distribution
Reach across major podcast platforms, updated hourly
Total Followers
—
Total Plays
—
Total Reviews
—
* Data sourced directly from platform APIs and aggregated hourly across all major podcast directories.
On the show
From 11 epsHosts
Recent guests
Recent episodes
The Partnerships Taking on AI Security: Daniel Bernard, CrowdStrike Chief Business Officer
May 7, 2026
38m 38s
The "Vuln-pocalypse" Looms: Are We Cooked?
Apr 23, 2026
29m 04s
Hunting Supply Chain Attacks with Jared Myers, Director, CrowdStrike OverWatch
Apr 9, 2026
26m 18s
Breaking Down the New National Cybersecurity Strategy
Mar 10, 2026
47m 31s
Speed, Stealth, and AI: The CrowdStrike 2026 Global Threat Report
Feb 24, 2026
33m 15s
Social Links & Contact
Official channels & resources
Official Website
Login
RSS Feed
Login
| Date | Episode | Topics | Guests | Brands | Places | Keywords | Sponsor | Length | |
|---|---|---|---|---|---|---|---|---|---|
| 5/7/26 | ![]() The Partnerships Taking on AI Security: Daniel Bernard, CrowdStrike Chief Business Officer✨ | AI securitypartnerships+3 | Daniel Bernard | Project QuiltworksProject Glasswing+4 | — | AI securityvulnerabilities+5 | — | 38m 38s | |
| 4/23/26 | ![]() The "Vuln-pocalypse" Looms: Are We Cooked?✨ | cybersecurityAI vulnerabilities+3 | AdamCristian | CrowdStrike | — | vuln-pocalypseAI+3 | — | 29m 04s | |
| 4/9/26 | ![]() Hunting Supply Chain Attacks with Jared Myers, Director, CrowdStrike OverWatch✨ | supply chain attacksAI security+3 | Jared Myers | CrowdStrikeCrowdStrike OverWatch | — | supply chain attacksAI+6 | — | 26m 18s | |
| 3/10/26 | ![]() Breaking Down the New National Cybersecurity Strategy✨ | national cybersecurity strategyoffensive cyber operations+4 | Rob Sheldon | CrowdStrikeTrump administration+1 | Washington, D.C. | cybersecuritycyber operations+5 | — | 47m 31s | |
| 2/24/26 | ![]() Speed, Stealth, and AI: The CrowdStrike 2026 Global Threat Report✨ | Global Threat Reportcybersecurity+4 | — | CrowdStrike | ChinaNorth Korea | CrowdStrikeGlobal Threat Report+7 | — | 33m 15s | |
| 2/12/26 | ![]() Interview with a Threat Hunter: Brody Nisbet, Sr. Director of CrowdStrike OverWatch✨ | threat huntingcybersecurity+3 | Brody Nisbet | Fluffy CannoliCrowdStrike+1 | — | threat huntingCrowdStrike+4 | — | 39m 49s | |
| 1/29/26 | ![]() LABYRINTH CHOLLIMA Evolves into Three Adversaries✨ | cybersecurityNorth Korea+4 | — | CrowdStrikeDPRK+3 | — | LABYRINTH CHOLLIMAGOLDEN CHOLLIMA+5 | — | 32m 06s | |
| 1/15/26 | ![]() Taking Down Cybercriminals with Shawn Henry, Former FBI Leader✨ | cybercrimelaw enforcement+4 | Shawn Henry | FBICrowdStrike | — | cybercriminalstakedown+6 | — | 48m 46s | |
| 12/30/25 | ![]() 2025 Wrapped: Updates on This Year’s Hottest Topics✨ | cybersecurityAI weaponization+4 | — | CrowdStrikeSCATTERED SPIDER+1 | China | cyberattacksI-Soon data leaks+4 | — | 36m 11s | |
| 12/18/25 | ![]() Is This Endgame? How Takedowns Are Reshaping eCrime✨ | eCrimemalware networks+4 | — | CrowdStrikeEuropol | EUAustralia+3 | takedownsmalware+5 | — | 35m 45s | |
Want analysis for the episodes below?Free for Pro Submit a request, we'll have your selected episodes analyzed within an hour. Free, at no cost to you, for Pro users. | |||||||||
| 12/4/25 | ![]() Defrosting Cybersecurity’s Cold Cases with CrowdStrike’s Tillmann Werner✨ | cybersecuritycold cases+5 | Tillmann Werner | CrowdStrikeCrowdStrike Intelligence | — | cybersecuritycold cases+6 | — | 34m 27s | |
| 11/20/25 | ![]() Prompted to Fail: The Security Risks Lurking in DeepSeek-Generated Code | CrowdStrike research into AI coding assistants reveals a new, subtle vulnerability surface: When DeepSeek-R1 receives prompts the Chinese Communist Party (CCP) likely considers politically sensitive, the likelihood of it producing code with severe security flaws increases by up to 50%. Stefan Stein, manager of the CrowdStrike Counter Adversary Operations Data Science team, joined Adam and Cristian for a live recording at Fal.Con 2025 to discuss how this project got started, the methodology behind the team’s research, and the significance of their findings. The research began with a simple question: What are the security risks of using DeepSeek-R1 as a coding assistant? AI coding assistants are commonly used and often have access to sensitive information. Any systemic issue can have a major and far-reaching impact. It concluded with the discovery that the presence of certain trigger words — such as mentions of Falun Gong, Uyghurs, or Tibet — in DeepSeek-R1 prompts can have severe effects on the quality and security of the code it produces. Unlike most large language model (LLM) security research focused on jailbreaks or prompt injections, this work exposes subtle biases that can lead to real-world vulnerabilities in production systems. Tune in for a fascinating deep dive into how Stefan and his team explored the biases in DeepSeek-R1, the implications of this research, and what this means for organizations adopting AI. | 37m 09s | ||||||
| 11/6/25 | ![]() Extortion Rises and Nation-State Activity Intensifies: The CrowdStrike 2025 European Threat Landscape Report | Europe is a prime target for global adversaries. There is a strong emphasis on eCrime across the region as well as a rise in hacktivism and espionage stemming from ongoing conflicts.The CrowdStrike 2025 European Threat Landscape Report breaks down these trends. In this episode, Adam and Cristian cover the highlights.They start with cybercrime, a major theme of the report. The five most targeted European nations were the U.K., Germany, Italy, France, and Spain, which also represent the region’s largest economies (excluding Russia). The most targeted sectors were manufacturing, professional services, technology, industrials and engineering, and retail. Adam explains how eCrime threat actors are looking for victims with a high need to stay operational.“With manufacturing, if they’re knocked offline because of ransomware, they can count the downtime in dollars and cents,” he shares as an example.On the nation-state front, Russia is top of mind. Since its invasion of Ukraine in 2022, many Russian threat actors who operated globally are more focused on Ukraine and areas related to the conflict. Adam and Cristian discuss reports of North Korean threat actors supporting the Russians with weapons and personnel, North Korea targeting Ukraine, and the tactics and techniques that stand out most. The European threat landscape is crowded and complex. Tune in to understand the key findings, and download the full report for more details. https://www.crowdstrike.com/en-us/resources/reports/2025-european-threat-landscape-report/ | 27m 00s | ||||||
| 10/23/25 | ![]() Thriving Marketplaces and Regional Threats: The CrowdStrike 2025 APJ eCrime Landscape Report | In the Asia Pacific and Japan (APJ) region, a burgeoning set of threat actors is emerging with a different language set, distinct tools, and an ecosystem where they interact with adversaries across the threat landscape.The CrowdStrike 2025 APJ eCrime Landscape Report explores the trends and issues facing organizations operating in this part of the world. For example, criminal groups in APJ are focused on opportunistic big game hunting and primarily target organizations in manufacturing, technology, industrials and engineering, financial services, and professional services. The sale of phishing kits is popular, with some going for up to $1 million. These threat actors prefer phishing, spam campaigns, and remote access toolkits to enable their operations. And they often find them on thriving Chinese-language marketplaces, which enable the sale of illicit services. While Eastern Europe is typically known as a hotbed of eCrime activity, the APJ region is one to watch. Tune in to hear Adam and Cristian discuss the key adversaries operating in the region, the threats that stand out to them, and how defenders can stay safe. Read the report: 2025 APJ eCrime Landscape Report Watch on YouTube: https://youtu.be/97javj3hmAA | 19m 52s | ||||||
| 10/16/25 | ![]() A Brief History of Ransomware | Ransomware is not new, but the ransomware of today is very different from the ransomware of 1989. Today’s episode doubles as a history lesson, as Adam and Cristian look back at how a prolific global threat has evolved over the decades. Gone are the days of malware arriving on floppy disks and victims waiting weeks to restore their systems in exchange for $200 ransom payments. “The early days of viruses were weird,” Adam points out. But much has changed since then. Several factors — the advent of cryptocurrency, the rise of enterprise targeting, and the shift to ransomware as a service — have caused the threat to transform. Today’s adversaries run ransomware like a business and collect hundreds of millions of dollars in payments. The hosts reflect on the first ransomware to hit a business, the first to make news headlines, and the first major botnet operator to deploy ransomware, among other key events. Tune in for a discussion that spans years of ransomware evolution, highlights the key adversaries involved, and explains how businesses can defend themselves as the threat landscape continues to change. | 38m 48s | ||||||
| 9/12/25 | ![]() Tech Sector Targeting, Innovation Race, Fal.Con Countdown | This week’s episode arrives as Adam and Cristian are gearing up for Fal.Con, CrowdStrike’s annual event taking place next week in Las Vegas. They’ll be recording a live episode on some fascinating LLM research presented at the show, so stay tuned for that in a couple of weeks.Amid their prep, they took the time to sit down for a conversation starting with a simple prompt: What are today’s security leaders and practitioners talking about? Their discussion sheds light on the industries hardest hit by nation-state and eCrime activity and explores why some sectors, like technology and telecommunications, are seeing a sharp spike in targeted intrusions while others are facing an increase in cybercrime.Tune in to learn about shifts in Chinese cyber activity, what happens when an adversary sees another adversary in a target environment, and whether modern tech innovations will drive changes in cyber espionage. | 17m 33s | ||||||
| 8/18/25 | ![]() Live at Black Hat: What’s AI Really Capable Of? | This year at Black Hat, the topic of AI was everywhere — from hallway chats to the expo floor. Adam and Cristian took a break from the action for a rare in-person conversation about how adversaries are weaponizing AI, how defenders are using agentic AI, and what we should all be thinking about as AI evolves as an offensive and defensive tool.The AI threat is real, and advanced adversaries in particular are using it to their advantage. They’re improving the wording in social engineering attacks, creating deepfakes in fraudulent job interviews, and targeting victims on a more personal level. FAMOUS CHOLLIMA is an example of one adversary “using it for everything,” the hosts say. SCATTERED SPIDER is another adversary to watch.On the other side, defenders are adopting agentic AI to expedite their response. Adam and Cristian explore the importance of protecting AI workloads, the potential for insider threats with AI models, and the growing need for AI governance and security guardrails. If AI is monitoring security services, they ask, who guards the guardian? Tune in for an in-depth conversation on what AI is really capable of — and stick around for a sneak peek of an upcoming guest episode, where a guest joins to discuss young adversaries moving from online gaming to organized cybercrime. | 33m 45s | ||||||
| 8/4/25 | ![]() Cloud Intrusions Rise, eCrime Thrives, Governments Under Attack: CrowdStrike 2025 Threat Hunting Report | In the first half of 2025 alone, cloud intrusions were up 136% compared to all of 2024. China was a big driver — CrowdStrike saw a 40% year-over-year surge in intrusions from suspected cloud-conscious China-nexus threat actors. In the government sector, interactive intrusions increased 71%, and targeted intrusion activity jumped 185%. The CrowdStrike OverWatch threat hunting team has a firsthand look at how adversaries are changing their techniques. In the CrowdStrike 2025 Threat Hunting Report, published today, the team shares observations, trends, and shifts seen in its threat hunting and adversary engagements over the past 12 months. In this episode, Adam and Cristian dive deep into the report’s key findings and put them into context. They explore why the use of malware is going down (and why it won’t go away), unpack the rise in government intrusions, and explain the role of generative AI (GenAI) in today’s threat landscape. They examine the rise of prolific adversaries such as SCATTERED SPIDER and FAMOUS CHOLLIMA and discuss the techniques organizations can use to stop them. Below are more key stats from this year’s report: 73% of all interactive intrusions were eCrime 81% of interactive intrusions were malware-free In the first half of 2025, voice phishing (vishing) attacks surpassed the total number seen in 2024 FAMOUS CHOLLIMA insiders infiltrated 320+ companies in the last 12 months — a 220% year-over-year increase — by using GenAI throughout hiring and employment Download the report to learn more. Links: 📃 Threat Hunting Report: https://www.crowdstrike.com/resources/reports/threat-hunting-report/ 🎧 Our site: https://www.crowdstrike.com/en-us/resources/adversary-universe-podcast/ | 36m 02s | ||||||
| 7/17/25 | ![]() The Return of SCATTERED SPIDER | They never really left — they just got quieter, faster, and bolder. In this episode of the Adversary Universe podcast, Adam and Cristian trace the resurgence of SCATTERED SPIDER, one of today’s most aggressive and sophisticated adversary groups. Once known for SIM swapping and gaming community exploits, SCATTERED SPIDER has evolved into a high-speed, high-impact ransomware crew targeting the retail, insurance, and aviation sectors. Adam shares CrowdStrike’s front-line insights into how the group operates, from conducting help desk social engineering and bypassing multifactor authentication (MFA) to hijacking hypervisors and exfiltrating data via software as a service (SaaS) integrations. Tune in to learn: How SCATTERED SPIDER blends SIM swapping, voice phishing, and cloud-native tradecraft Why they’re one of the fastest threat actors we’ve seen, sometimes encrypting systems within 24 hours What defenders must do to spot them early and act fast And yes, why they still haven’t been arrested Check the show notes for CrowdStrike’s latest guidance and technical blog on SCATTERED SPIDER. | 33m 45s | ||||||
| 7/3/25 | ![]() Ask Us (Almost) Anything: Threat Intel, Adversaries, and More | You asked, and we answered. This episode of the Adversary Universe podcast takes a deep dive into questions from our listeners. What did you want to know? Well, a lot about adversaries, but also about career paths and the threat intel space. Tune in to hear the answers to questions like: • How did you break into the threat intelligence space?• Who is the first adversary CrowdStrike tracked? • Who is an adversary that keeps you up at night and why?• What was a jaw-dropping moment you experienced in tracking adversaries?• If you didn’t work in infosec, what would your dream job be? Thanks to everyone who submitted questions. We’d love to continue hearing from you. 💼 Careers at CrowdStrike: https://www.crowdstrike.com/en-us/careers/ | 25m 13s | ||||||
| 6/19/25 | ![]() When the Adversary Shows Up in Person | Physical security and IT security have gone hand in hand for a long time. While cybersecurity teams are rightfully focused on protecting their virtual environments, they should also have an eye on whether an adversary is walking through the front door. “Anytime there’s a physical boundary, an adversary is going to look to cross over that — whether it be in person or using some technology to get over that boundary,” Adam says in this episode on physical security threats. Not too long ago, it was common for someone to walk into a business, slide behind the counter, and insert a USB device into a point-of-sale system to deploy malware or remote access tools. Now, this type of activity is less common, but it still occurs; China-nexus threat actor MUSTANG PANDA, for example, is dropping USB sticks to gain access to targets across the Asia Pacific region. This conversation is full of twists, turns, and interesting stories. Tune in to hear about adversaries physically breaking into target organizations, Adam’s adventures in pen testing, the physical security implications for internet of things (IoT) and operational technology (OT) environments, and what organizations should know about protecting their physical environments. | 25m 24s | ||||||
| 6/5/25 | ![]() Where AI Fits in the Adversary’s Toolbox | Would you rather have an adversary profile you based on your AI chat history or tell your AI chatbot to forget everything it knows about you? That’s one of many questions Adam and Cristian explore in this episode on how adversaries are integrating AI into cyberattacks. These days, it seems AI is everywhere — and that includes the adversary’s toolbox. Adam and Cristian describe multiple forms of malware that use AI in different ways, from identifying text in photos to writing code. And while these attacks still require humans to stitch all the pieces together, there is a growing concern that adversaries will continue to improve. Tune in to learn how adversaries are baking AI into their tools, and about Adam’s latest adventures in baking bread, in this episode of the Adversary Universe podcast. | 20m 31s | ||||||
| 5/28/25 | ![]() Catching Up on Cloud Attack Paths with Cloud Threat Specialist Sebastian Walla | Today’s adversaries are increasingly operating in the cloud — and Sebastian Walla, Deputy Manager of Emerging Threats at CrowdStrike, is watching them. In this episode, he joins Adam and Cristian to dive into the latest cloud attack techniques and the adversaries behind them. So, who are they? SCATTERED SPIDER and LABYRINTH CHOLLIMA are two of the threat actors targeting and navigating cloud environments, but they have distinct methods of doing so. This conversation explores the different ways they slip into organizations undetected, some of the tools they rely on, and how they operate under the radar. It also touches on the future of cloud threat activity and AI’s influence on how these attacks are evolving. Of course, no Adversary Universe episode is complete without guidance. Adam, Cristian, and Sebastian share best practices for protecting enterprise cloud environments from these threats as adversaries continue to take aim. | 28m 53s | ||||||
| 5/8/25 | ![]() Inside the CrowdStrike 2025 Latin America Threat Landscape Report | Latin America has become a hotspot for cyber activity. Threat actors around the world, particularly eCriminals, are targeting organizations operating in Central and South America, Mexico, and the Caribbean. Latin America-based cybercriminals are emerging as well. The CrowdStrike 2025 Latin America Threat Landscape Report provides key insights into this activity. In its pages, the CrowdStrike Counter Adversary Operations team details the eCrime, targeted intrusions, hacktivist disruptions, and cyber espionage targeting organizations that operate in Latin America. And in this episode of the Adversary Universe podcast, Adam and Cristian give listeners a snapshot of the key findings. These include: A 15% increase in Latin America-based victims named on data extortion and ransomware leak sites in 2024 Over one billion credentials leaked from Latin American organizations last year The evolving presence of eCriminals such as OCULAR SPIDER The activity of nation-state adversaries such as LIMINAL PANDA and VIXEN PANDA, both linked to China Tune in to learn how this report came to be and understand some of the critical trends shaping the Latin America threat landscape. And of course, check out the report to learn all the details. Links: Read the CrowdStrike 2025 Latin America Threat Landscape Report: https://www.crowdstrike.com/en-us/resources/reports/latam-threat-landscape-report/ Listen to our full episode on OCULAR SPIDER, referenced in this episode: https://open.spotify.com/episode/3gJMkVKuSfKhqSAHwMb7NX?si=cf2e453ebc0843a5 🎧 Spotify: https://open.spotify.com/show/1ZYDiiBuJvTx7YsvuCenEZ 🎧 Apple Podcasts: https://podcasts.apple.com/us/podcast/adversary-universe-podcast/id1694819239 🎧 Our site: https://lnkd.in/etSAySBb | 20m 49s | ||||||
| 4/10/25 | ![]() OCULAR SPIDER and the Rise of Ransomware-as-a-Service | Ransomware has become more difficult for organizations to defend against, but easier for adversaries to deploy. The rise of ransomware-as-a-service (RaaS) — a model in which ransomware operators write the malware and affiliates pay to launch it — has lowered the barrier to entry so threat actors of all skill levels can participate and profit. OCULAR SPIDER is one such operator. This adversary, newly named by CrowdStrike, is associated with the development of ransomware variants including Cyclops, Knight, and RansomHub. They targeted hundreds of named victims between February 2024 and March 2025, according to CrowdStrike intelligence, and they focus on industries such as professional services, technology, healthcare, and manufacturing in regions including the United States, Canada, Brazil, and some European countries. But OCULAR SPIDER is one of many operators in the ransomware space. Adam and Cristian take listeners back to the early days of ransomware and track its evolution, variants, and key players from the mid-2010s through the launch of RansomHub in 2024. They explain how RaaS works, why it appeals to adversaries and complicates attribution, and how defenders can prepare to face today’s ransomware threats. Come for an update on Adam’s adventures in bread-making; stay for a deep-dive into the RaaS evolution and the threat actors driving it. | 29m 09s | ||||||
Showing 25 of 73
Sponsor Intelligence
Sign in to see which brands sponsor this podcast, their ad offers, and promo codes.
Chart Positions
4 placements across 4 markets.
Chart Positions
4 placements across 4 markets.
