Loading...

Security Unlocked

Hunting Variants: Finding the Bugs Behind the Bug

In this episode of The BlueHat Podcast, host Nic Fillingham is joined by George Hughey from Microsoft who returns to discuss his Blue Hat Indi...

4 days ago

Securing Redirections with Mike Macelletti

In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone are joined by Mike Macelletti from Microsoft’s MSRC Vulnerabiliti...

18 days ago

Ignore Ram Shankar Siva Kumar’s Previous Directions

In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone share Ram Shankar Siva Kumar’s dynamic keynote from BlueHat India...

1 month ago

Protecting AI at the Edge with David Weston

In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone share David Weston’s keynote from BlueHat India 2025. David explo...

1 month ago

Hacking at the Weeds with Felix Boulet

In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone are joined by Felix Boulet fresh off his participation in Zero Da...

2 months ago

Evolutions in Hacking with Marco Ivaldi

In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone are joined by Marco Ivaldi, co-founder and technical director of ...

2 months ago

From Facebook-phished to MVR Top 5 with Dhiral Patel

In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone are joined by Dhiral Patel, Senior Security Engineer at ZoomInfo ...

2 months ago

Cryptojacking, and Farewell for Now!

This episode of Security Unlocked delves into the world of cryptocurrency and the prevalence of cryptojacking. Hosts Natalia Godyla and Nic Fi...

3 years ago

A look at Cybercrime in 2021

This episode of Security Unlocked takes a deep dive into the growing threat of cybercrime in 2021. Ransomware attacks in particular have becom...

3 years ago
Stay up to date with latest Microsoft Dynamics 365 and Power Platform news!
* Yes, I agree to the privacy policy