
Insights from recent episode analysis
Audience Interest
Podcast Focus
Publishing Consistency
Platform Reach
Insights are generated by CastFox AI using publicly available data, episode content, and proprietary models.
Est. Listeners
Based on iTunes & Spotify (publisher stats).
- Per-Episode Audience
Est. listeners per new episode within ~30 days
1 - 1,000 - Monthly Reach
Unique listeners across all episodes (30 days)
1 - 5,000 - Active Followers
Loyal subscribers who consistently listen
1 - 500
Market Insights
Platform Distribution
Reach across major podcast platforms, updated hourly
Total Followers
—
Total Plays
—
Total Reviews
—
* Data sourced directly from platform APIs and aggregated hourly across all major podcast directories.
On the show
Recent episodes
EP24 The Glupteba Takedown: What Happens When Botnet Operators Show Up in Court with Pierre-Marc Bureau
Apr 1, 2026
54m 36s
EP23 Immutable C2: How EtherHiding and Frontend Attacks are Weaponizing the Blockchain
Mar 4, 2026
41m 12s
EP22 Jailbreaking, Prompt Injection, and the "Agentic" Flaw in MCP with Kevin Harris
Feb 4, 2026
57m 27s
EP21 From HITB Origins to Agentic AI: Web3, Music & The Future of Hacking with Dhillon Kannabhiran
Jan 14, 2026
1h 02m 28s
EP20 Windows Under the Hood: Kernel Design, EDRs, and the Shift to VBS with Pavel Yosifovich
Dec 10, 2025
1h 10m 25s
Social Links & Contact
Official channels & resources
Official Website
Login
RSS Feed
Login
| Date | Episode | Description | Length | ||||||
|---|---|---|---|---|---|---|---|---|---|
| 4/1/26 | EP24 The Glupteba Takedown: What Happens When Botnet Operators Show Up in Court with Pierre-Marc Bureau | "I thought that we would never hear about these people after they were named. But what was a surprise is that they actually hired a lawyer in New York... and they were like, 'Yeah, we're going to be taking part in this trial." In this episode, we are joined by Pierre-Marc Bureau from Google’s Threat Intelligence Group (GTIG) to unpack the unprecedented takedown of the Glupteba botnet. Active since 2011, Glupteba infected roughly 1 million Windows devices before Google launched a coordinated t... | 54m 36s | ||||||
| 3/4/26 | EP23 Immutable C2: How EtherHiding and Frontend Attacks are Weaponizing the Blockchain | In this episode, we are joined by Robert Wallace, Joseph Dobson, and Blas Kajusner to dissect the new "Hybrid Heist." The panel argues that the era of isolated crypto-theft is over; sophisticated actors are now targeting the Web2 layer—the frontends, the developer workstations, and the cloud infrastructure—to bypass the immutability of the chain itself. We also break down "Ether Hiding," a technique where attackers store malware payloads directly on the blockchain to create an unstoppable Com... | 41m 12s | ||||||
| 2/4/26 | EP22 Jailbreaking, Prompt Injection, and the "Agentic" Flaw in MCP with Kevin Harris | "Skilled adversaries have a 100% success rate against all of the defenses that we know about." In this episode, Kevin Harris defends that claim. We move past the standard "AI Safety" talking points to distinguish between the two attack vectors confusing the industry: Prompt Injection (an application-layer failure) vs. Jailbreaking ("gaslighting" the model via context shifting). Kevin argues that we haven't actually invented AI yet—we've just built a mirror that reflects our own intelligence (... | 57m 27s | ||||||
| 1/14/26 | EP21 From HITB Origins to Agentic AI: Web3, Music & The Future of Hacking with Dhillon Kannabhiran | In this episode, Dhillon Kannabhiran shares the gritty origin story of Hack in the Box (HITB), detailing how he dug a $20k financial hole to launch the first event in Malaysia before building it into a global brand. The conversation moves beyond conferences to explore the cutting edge of technology and creativity. Dhillon explains why "agentic" systems (like Xbow) signal the end of hand-built exploits and discusses the unique challenges of securing Web3 smart contracts. We also dive into the ... | 1h 02m 28s | ||||||
| 12/10/25 | EP20 Windows Under the Hood: Kernel Design, EDRs, and the Shift to VBS with Pavel Yosifovich | In this episode, we get a unique look at the history of Windows through the eyes of one of its leading experts, Pavel Yosifovich. We delve into his fascinating origin story, including the "fluke" that led him to become the author of the legendary Windows Internals series, and why he describes himself as a developer who "hates security." The conversation explores the most significant foundational changes in Windows kernel design, specifically the architectural shift toward Virtualization-Based... | 1h 10m 25s | ||||||
| 11/19/25 | EP19 The Art of Deconstructing Problems: Tools, Tactics, and the ScatterBrain Obfuscator with Nino Isakovic | In this episode, we’re joined by Nino Isakovic, a long-time low-level security expert, for a thought-provoking conversation that spans the foundational and the cutting-edge. Nino discusses the art of deconstructing problems—sharing insights on how to learn effectively, the building blocks of a robust RE toolkit, and the critical shift required in our analytical approach. We then transition into the front lines of threat intelligence, where Nino discusses the specific challenges of analyzing s... | 1h 53m 18s | ||||||
| 11/5/25 | EP18 10,000 DLLs and Too Much Math - Wrapping Up FLARE-On 12 with the FLARE Team | In this episode, we sit down with Nick Harbour, Blas Kojusner, Moritz Raabe, and Sam Kim — members of the FLARE Team and some of this year’s challenge authors — for a deep dive into the design and execution of FLARE-On 12. The team discusses the complexity and intent behind this year's challenges, including how Sam created his grueling final challenge, "10,000," which featured 10,000 individual DLLs to force competitors toward automation. Sam reveals that solving the final puzzle required dee... | 47m 45s | ||||||
| 10/22/25 | EP17 What Lurks Beneath: Building a Robust Network at Black Hat with Mark Overholser | In this episode, we're asking the question: "What Lurks Beneath?" We're joined by Mark Overholser, a Technical Marketing Engineer at Corelight who's part of the team running the Black Hat Network Operations Center (NOC). We discuss the incident during Black Hat 2025 that introduced us and revealed the team's proactive approach to protecting every guest from the unseen threats hiding in the shadows. Mark gives us an insider’s look at the philosophy and challenges behind building a robust netwo... | 1h 09m 36s | ||||||
| 10/1/25 | EP16 The Machine Learning Revolution in Reverse Engineering with Hahna Kane Latonick | In this episode of Behind the Binary, we're joined by renowned security researcher Hahna Kane Latonick for a deep dive into the powerful world where reverse engineering meets data science. Hahna shares her expertise on how techniques like supervised and unsupervised learning can be used to classify and predict security threats, and she explains how deep learning and neural networks are being applied to identifying code sharing and solving other classification problems. We also discuss how Gen... | 1h 25m 26s | ||||||
| 9/17/25 | EP15 Getting Ready for FLARE-On 12 - An Inside Look at the Reverse Engineering Gauntlet | In this episode, we're "Getting Ready for FLARE-On 12" with an inside look at the world-renowned reverse engineering competition. We’re joined by long-time FLARE-On host and challenge author Nick Harbour and regular challenge author Blas Kojusner for an in-depth conversation. We'll take a brief tour of FLARE-On history and discuss how it has grown into a must-do event for malware analysts and reverse engineers. We’ll also break down how the competition works, from the evolution of the unique ... | 39m 13s | ||||||
Want analysis for the episodes below?Free for Pro Submit a request, we'll have your selected episodes analyzed within an hour. Free, at no cost to you, for Pro users. | |||||||||
| 9/3/25 | EP14 Web3's Dark Side: Unmasking the New Age of Financial Crime | Web3 promised a new era of decentralized finance, but it has also created a new frontier for crime, with thefts and hacks far surpassing those in the traditional financial sector. In this episode, we sit down with experts Blas Kojusner, Robert Wallace, and Joseph Dobson to explore the Wild West of Web3 and decentralized finance (DeFi). But what is Web3? Our episode begins by taking a look at Web3 technologies like DeFi, blockchain, and smart contracts and explain how their very design makes t... | 1h 12m 14s | ||||||
| 8/13/25 | EP13 Beyond the Bug: Scaling Bug Bounty Programs & Launching a Cyber Startup with Dr. Jared DeMott | In this episode of Behind the Binary, we sit down with Dr. Jared DeMott to pull back the curtain on the world of cybersecurity. Formerly with the Microsoft Security Response Center (MSRC), Jared shares invaluable wisdom on managing bug bounty programs at scale and what truly makes a good bug report. We then pivot to explore his fascinating career journey, from his start with the NSA to leading teams at Microsoft. If that wasn’t enough, we’ll also dive into the unique challenges of a cyber sta... | 37m 15s | ||||||
| 7/16/25 | EP12 Unpacking Malware & Minds: A Reverse Engineer's Journey with Danny Quist | Join us as we explore the world of reverse engineering with pioneer and CTO, Danny Quist. We'll examine the evolving landscape of binary analysis tools, the constant battle with malware obfuscation, and what it was like building one of the very first malware repositories for research. Plus, Danny shares unique insights on neuro-diversity and cognitive load – crucial topics that impact us all. That's just a glimpse of what's ahead. Danny Quist isn't just a leading mind in reverse engineering; ... | 59m 50s | ||||||
| 6/25/25 | EP11 Tracing Lazarus: Greg Sinclair on Attributing North Korean Cyber Threats Through Binary Similarity | Ever wonder who names the world's most notorious APTs? In this episode, we sit down with Greg Sinclair, a reverse engineer from the FLARE team at Google. Greg not only hunts down sophisticated malware but also shares the behind the scenes story of how he discovered and named the North Korean APT, the Lazarus Group. He also discusses his innovative methods for identifying malware families through binary similarities. Get ready for an inside look at the challenges, triumphs, and the sheer passi... | 1h 02m 10s | ||||||
| 6/4/25 | EP10 Tim Blazytko - Protecting Intellectual Property: Obfuscation & Anti-Reverse Engineering in Software | What goes into creating effective software protections? This episode features a conversation with Tim Blazytko, Chief Scientist and Head of Engineering at Emproof, about the essential strategies for protecting software intellectual property. We cover the core concepts of code obfuscation and anti-reverse engineering and discuss practical, modern approaches to implementing these defenses effectively, while also shedding light on the significant challenges and trade-offs involved. Listeners wil... | 1h 08m 32s | ||||||
| 5/14/25 | EP09 Thomas Roccia - AI, Data Visualization, and the Future of Security Research | In this episode, we’re joined by Thomas Roccia, a security researcher at Microsoft. Thomas discusses the growth of the Unprotect Project, how AI is changing security research, and the impact of data visualizations for conveying technical information. Drawing on his experience, Thomas offers a unique perspective on the intersection of open-source collaboration, artificial intelligence, and effective communication in the cybersecurity field. Join the Community Research Hub: Threat research, tra... | 1h 08m 07s | ||||||
| 4/23/25 | EP08 Roman Hussy - Inside AbuseCH: A Community's Fight Against Malware | This episode shines a light on abuse.ch, a vital non-profit project built by and for the global cybersecurity community. We chat with founder Roman Huessy about the collective effort behind tracking malware and botnets for over a decade. Discover the journey of maintaining a crucial shared resource—the technical challenges of hosting an open platform designed for community benefit, and how collaboration fuels the fight against threat actors. Roman shares insights into the future of community-... | 42m 13s | ||||||
| 4/2/25 | EP07 Jordan Wiens - Inside the Mind of a Binary Ninja: CTFs, AI and the Future of Cyber Security | In this episode, we have a fascinating conversation with Jordan Wiens, developer of the widely used Binary Ninja, and co-founder of Vector 35. Jordan brings his expertise as an avid CTF player to a discussion about the complexities of building a commercial reverse engineering platform, the importance of community growth, and the significant future role of AI. We also delve into the unique nature of having active adversaries inherent in cyber security work. Resources mentioned in this episode:... | 59m 16s | ||||||
| 3/5/25 | EP06 Duncan Ogilvie - Piano Tuning & Debugging: The Story of x64dbg | In this episode, we're sitting down with Duncan Ogilvie, the creator of x64dbg! We'll dive deep into how one of the most popular Windows debuggers got its start, explore the real-world challenges of running a major open-source software project, and even get a glimpse into the future of this essential tool. You'll also learn how piano tuning almost stopped this project from existing! Resources mentioned in this episdoe: Discord community for x64dbg: discord.x64dbg.com Join the Community Resear... | 46m 15s | ||||||
| 2/12/25 | EP05 Saumil Shah - From Black Hat to RingZer0: Shaping the World of Reverse Engineering | Saumil Shah, a security researcher, discusses his journey into reverse engineering, starting with his early interest in patching games and analyzing viruses. He emphasizes the evolution of reverse engineering tools and techniques, from manual approaches to AI-driven automation, and shares his insights on the future of the field and the importance of continuous learning. We also discuss his journey from veteran Black Hat instructor to starting his own security conference. Join the Community Re... | 1h 06m 31s | ||||||
| 1/15/25 | EP04 Stephen Eckels - A Journey From Game Modding to SolarWinds: How One Gamer Became a Renowned Reverse Engineer | In this episode, we are joined by Stephen Eckels of the FLARE team at Google (Mandiant). Stephen discusses his journey into the field, starting with his early interest in video game modding and hacking. He shares his experience in discovering the Sunburst backdoor in the SolarWinds attack and emphasizes the importance of continuous learning, community engagement, and the evolving landscape of reverse engineering tools and techniques. Join the Community Research Hub: Threat research, training ... | 1h 05m 36s | ||||||
| 12/11/24 | EP03 Ryan Chapman - From Software Cracking to Threat Hunting: A Reverse Engineering Story | Join us as I sit down with renowned threat hunter, Ryan Chapman. Ryan shares his incredible journey from a curious young hacker to a formidable force in cybersecurity. Discover how his early fascination with software cracking ignited a passion for reverse engineering, ultimately leading him to the front lines of cyber defense. In this conversation, Ryan delves into his early days learning reverse engineering and recounts some pivotal moments. He discusses the evolution of malware obfuscation ... | 53m 02s | ||||||
| 11/20/24 | EP02 Victor Manuel Alvarez - Motivation, Community, and the Future with YARA-X: Building the Future of Threat Detection | In this episode we’re sitting down with Victor Manuel Alvarez, the creator of YARA. YARA is one of the most powerful tools in cybersecurity. We discuss his early career, what motivated him to create YARA, and the role the community has played in its development. Plus, Victor shares his thoughts on the future of YARA and YARA-X, which is a ground-up rewrite of this venerable tool. Join the Community Research Hub: Threat research, training events and news: https://cloud.google.com/security/flar... | 31m 51s | ||||||
| 10/30/24 | EP01 Nick Harbour - Early Days of Incident Response, Mandiant History and FLARE-ON | Nick Harbour discusses his career journey from his early days in the Air Force to his work at Mandiant. He shares insights into the evolution of malware, his contributions to the field of malware analysis, and the development of the Flare-On contest, a reverse engineering challenge. Join the Community Research Hub: Threat research, training events and news: https://cloud.google.com/security/flareThe FLARE Insider: Get community updates and announcements. To subscribe, email flare-external@goo... | 1h 04m 53s | ||||||
Showing 24 of 24
Sponsor Intelligence
Sign in to see which brands sponsor this podcast, their ad offers, and promo codes.
Chart Positions
1 placement across 1 market.
Chart Positions
1 placement across 1 market.
