Ahmad Almorabea
The Cyber Riddler
Where we decipher the offensive and defensive side of the cyber world
ALL EPISODESLISTEN NOWStart Listening Today
Latest Episodes
Initial Access
In this episode of the cyber riddler, we talked about the critical first stage of cyberattacks: Initial Access. Learn how hackers breach organizations using tactics like phishing, exploiting vulnerabilities, stolen credentials, and supply chain attacks. We’ll explore real-world examples, discuss why...
Threats and Defenses
In this episode, we explore the modern cybersecurity threat landscape, examining sophisticated attacks like ransomware-as-a-service, supply chain breaches, and file-less malware. We discuss essential defensive strategies, including the use of Zero Trust architecture, behavioral analytics, and other ...
Zero-Day Exploits
In this episode of The Cyber Riddler podcast, we venture into the shadowy world of zero-day exploits, one of the most well known threats in the cybersecurity world . Zero-day exploits represent vulnerabilities that can be targeted before they are even known to exist, making them a significant concer...
Initial Access
In this episode of the cyber riddler, we talked about the critical first stage of cyberattacks: Initial Access. Learn how hackers breach organizations using tactics like phishing, exploiting vulnerabilities, stolen credentials, and supply chain attacks. We’ll explore real-world examples, discuss wh...
Threats and Defenses
In this episode, we explore the modern cybersecurity threat landscape, examining sophisticated attacks like ransomware-as-a-service, supply chain breaches, and file-less malware. We discuss essential defensive strategies, including the use of Zero Trust architecture, behavioral analytics, and other ...
Zero-Day Exploits
In this episode of The Cyber Riddler podcast, we venture into the shadowy world of zero-day exploits, one of the most well known threats in the cybersecurity world . Zero-day exploits represent vulnerabilities that can be targeted before they are even known to exist, making them a significant concer...
Threat Hunting
In this episode, delve into the world of cyber security through the lens of expert threat hunters. As they navigate the complex digital landscape, these skilled professionals employ advanced techniques and tools to investigate systems meticulously. Their mission: to unearth hidden implants and paylo...
Phishing World
In this episode of The Cyber Riddler, We dive into the cunning world of phishing scams, focusing on how Normal Users are reacting to these emails and how SOC (Security Operations Center) analysts can expertly analyze suspicious emails. We outline the essential tools and steps for dissecting emails,...
HookSweeper Tool
Hook Sweeper is a diagnostic utility designed to detect and report function hooking within the ntdll.dll, advapi32.dll, kernel32.dll libraries. This tool meticulously scans the exported functions Github: https://github.com/HookSweeper twitter: almorabea twitter: CyberRiddler
The Cyber Riddler: Malware Analysis - Karsten Hahn
In this episode we've covered the basics of malware analysis. Things that malware authors want to hide in their malware. How they want to make it hard for malware analysts to do their job. Our guest today has an extensive experience in malware analysis. He publishes many videos on malware reverse en...
The Cyber Riddler: Kernel Drivers - Yarden Shafir
In this episode we've talked about kernel drivers, We covered a variety of different topics like how to load a driver, signing process, HVCI and others, and we closed with Intel CET and Shadow stack. Yarden has a very great experience when it comes to windows internals topics, her work mainly in the...
Vulnerability Research Kevin Backhouse
Dive into cybersecurity's captivating world with our latest episode on Vulnerability Research! Discover the secrets of ethical hackers, uncover different vulnerabilities, and explore responsible disclosure processes. Get insider tips and tricks to level up your cybersecurity knowledge. Our guest Kev...
Ahmad Almorabea
I've Created This Podcast for Technical People
I have experience when it comes to Incident response, red teaming and security research
The Top Episodes
Featured Episodes
Initial Access
We Love Your Reviews
What People Are Saying
Or choose your favorite app:
A True Cyber Security Podcast You Will Enjoy.
Enjoying the show? You want to be a guest in it? Either way we love to hear from you.