Ahmad Almorabea

The Cyber Riddler 

Where we decipher the offensive and defensive side of the cyber world

ALL EPISODESLISTEN NOW

Start Listening Today

Latest Episodes

Logs Don't Lie
The Cyber RiddlerSeptember 21, 2025x
24
00:07:485.4 MB

Logs Don't Lie

Dive into the hidden world of Windows Event Logs — where SOC analysts uncover patterns, trace intrusions, and expose how attackers exploit the very logs meant to catch them. Learn how to spot the signals, build timelines, and stay one step ahead of the breach. X: @almorabeaX: @CyberRiddlerWebsite: h...

Initial Access
The Cyber RiddlerNovember 21, 2024x
23
00:06:574.81 MB

Initial Access

In this episode of the cyber riddler, we talked about the critical first stage of cyberattacks: Initial Access. Learn how hackers breach organizations using tactics like phishing, exploiting vulnerabilities, stolen credentials, and supply chain attacks. We’ll explore real-world examples, discuss why...

Threats and Defenses
The Cyber RiddlerSeptember 05, 2024x
22
00:12:478.82 MB

Threats and Defenses

In this episode, we explore the modern cybersecurity threat landscape, examining sophisticated attacks like ransomware-as-a-service, supply chain breaches, and file-less malware. We discuss essential defensive strategies, including the use of Zero Trust architecture, behavioral analytics, and other ...

Logs Don't Lie
The Riddler LabSeptember 21, 202500:07:49

Logs Don't Lie

Dive into the hidden world of Windows Event Logs — where SOC analysts uncover patterns, trace intrusions, and expose how attackers exploit the very logs meant to catch them. Learn how to spot the signals, build timelines, and stay one step ahead of the breach.   • X: @almorabea • X: @CyberRiddler • ...

Initial Access
The Riddler LabNovember 21, 202400:06:58

Initial Access

In this episode of the cyber riddler, we talked about  the critical first stage of cyberattacks: Initial Access. Learn how hackers breach organizations using tactics like phishing, exploiting vulnerabilities, stolen credentials, and supply chain attacks. We’ll explore real-world examples, discuss wh...

Threats and Defenses
The Riddler LabSeptember 05, 202400:12:48

Threats and Defenses

In this episode, we explore the modern cybersecurity threat landscape, examining sophisticated attacks like ransomware-as-a-service, supply chain breaches, and file-less malware. We discuss essential defensive strategies, including the use of Zero Trust architecture, behavioral analytics, and other ...

Zero-Day Exploits
The Riddler LabJune 04, 202400:11:34

Zero-Day Exploits

In this episode of The Cyber Riddler podcast, we venture into the shadowy world of zero-day exploits, one of the most well known threats in the cybersecurity world . Zero-day exploits represent vulnerabilities that can be targeted before they are even known to exist, making them a significant concer...

Threat Hunting
The Riddler LabMarch 26, 202400:06:34

Threat Hunting

In this episode, delve into the world of cyber security through the lens of expert threat hunters. As they navigate the complex digital landscape, these skilled professionals employ advanced techniques and tools to investigate systems meticulously. Their mission: to unearth hidden implants and paylo...

Phishing World
The Riddler LabFebruary 06, 202400:08:15

Phishing World

In this episode of The Cyber Riddler,  We dive into the cunning world of phishing scams, focusing on how Normal Users are reacting to these emails and how SOC (Security Operations Center) analysts can expertly analyze suspicious emails. We outline the essential tools and steps for dissecting emails,...

HookSweeper Tool
The Riddler LabOctober 02, 202300:03:20

HookSweeper Tool

Hook Sweeper is a diagnostic utility designed to detect and report function hooking within the ntdll.dll, advapi32.dll, kernel32.dll libraries. This tool meticulously scans the exported functions Github: https://github.com/HookSweeper twitter: almorabea twitter: CyberRiddler

The Cyber Riddler: Malware Analysis - Karsten Hahn
The Riddler LabSeptember 06, 202300:37:35

The Cyber Riddler: Malware Analysis - Karsten Hahn

In this episode we've covered the basics of malware analysis. Things that malware authors want to hide in their malware. How they want to make it hard for malware analysts to do their job. Our guest today has an extensive experience in malware analysis. He publishes many videos on malware reverse en...

The Cyber Riddler: Kernel Drivers - Yarden Shafir
The Riddler LabAugust 23, 202300:48:44

The Cyber Riddler: Kernel Drivers - Yarden Shafir

In this episode we've talked about kernel drivers, We covered a variety of different topics like how to load a driver, signing process, HVCI and others, and we closed with Intel CET and Shadow stack. Yarden has a very great experience when it comes to windows internals topics, her work mainly in the...

Ahmad Almorabea

I've Created This Podcast for Technical  People

I have experience when it comes to Incident response, red teaming and security research

More About The Show

The Top Episodes

Featured Episodes

Logs Don't Lie
The Cyber Riddler

Logs Don't Lie

Logs Don't Lie
Logs Don't Lie
00:07:48
Initial Access
Initial Access
00:06:57
Threats and Defenses
Threats and Defenses
00:12:47
Zero-Day Exploits
Zero-Day Exploits
00:11:33
Threat Hunting
Threat Hunting
00:06:33
Phishing World
Phishing World
00:08:14
HTTPS and TLS Tales
HTTPS and TLS Tales
00:10:23
Threat Intelligence
Threat Intelligence
00:07:13
Lateral Movement
Lateral Movement
00:08:49
Insider Threat
Insider Threat
00:08:07

We Love Your Reviews

What People Are Saying

Beamly
Why The Cyber Riddler is Worth Your Time

The Cyber Riddler is a standout podcast in the cybersecurity space. Hosted by Ahmad Almorabea, it combines technical expertise with storytelling that keeps you engaged from start to finish. Ahmad has a gift for taking complex ideas and explaining them in a way that is both clear and captivating. Each episode feels like...

Read More

A True Cyber Security Podcast You Will Enjoy.

Enjoying the show? You want to be a guest in it? Either way we love to hear from you.


Contact us