Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
TV & Film
Technology
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/5e/b4/21/5eb421cd-39ae-4cf5-7307-dc51db253668/mza_17906098394500704381.jpg/600x600bb.jpg
Cyber Voices
Australian Information Security Association (AISA)
56 episodes
1 day ago
Welcome to CYBER VOICES, where we highlight and celebrate the diverse voices of the Australian cyber community. From top-ranking CISOs and government officials to threat hunters and vulnerability analysts, if there’s a voice to be heard, you’ll hear it on CYBER VOICES. Join us as we delve into the stories, insights, and expertise that shape the world of cybersecurity in Australia.
Show more...
Technology
RSS
All content for Cyber Voices is the property of Australian Information Security Association (AISA) and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Welcome to CYBER VOICES, where we highlight and celebrate the diverse voices of the Australian cyber community. From top-ranking CISOs and government officials to threat hunters and vulnerability analysts, if there’s a voice to be heard, you’ll hear it on CYBER VOICES. Join us as we delve into the stories, insights, and expertise that shape the world of cybersecurity in Australia.
Show more...
Technology
https://d3wo5wojvuv7l.cloudfront.net/t_rss_itunes_square_1400/images.spreaker.com/original/1e4642ce500d7a17499fb848ec12326a.jpg
Rats and Freeloaders with Peter Watson
Cyber Voices
23 minutes
4 months ago
Rats and Freeloaders with Peter Watson
In another interview recorded live at CyberCon Canberra 2025, David chats with with Peter Watson from Recorded Future. Peter provides insights into malware loaders and Remote Access Trojans (RATS), shedding light on their evasive tactics and the complexity of defending against them. Additionally, he delves into techniques like DLL hijacking, illustrating their subtlety and effectiveness. The conversation highlights the challenges faced by security teams in detecting such activities, emphasising the role of threat intelligence.
Cyber Voices
Welcome to CYBER VOICES, where we highlight and celebrate the diverse voices of the Australian cyber community. From top-ranking CISOs and government officials to threat hunters and vulnerability analysts, if there’s a voice to be heard, you’ll hear it on CYBER VOICES. Join us as we delve into the stories, insights, and expertise that shape the world of cybersecurity in Australia.