1. EachPod
EachPod
Adversary Universe Podcast - Podcast

Adversary Universe Podcast

Modern adversaries are relentless. Today’s threat actors target organizations around the world with sophisticated cyberattacks. Who are they? What are they after? And most importantly, how can you defend against them? Welcome to the Adversary Universe podcast, where CrowdStrike answers all of these questions — and more. Join our hosts, a pioneer in adversary intelligence and a specialist in cybersecurity technology, as they unmask the threat actors targeting your organization.

News Technology Tech News
Update frequency
every 12 days
Average duration
33 minutes
Episodes
58
Years Active
2023 - 2025
Share to:
Tech Sector Targeting, Innovation Race, Fal.Con Countdown

Tech Sector Targeting, Innovation Race, Fal.Con Countdown

This week’s episode arrives as Adam and Cristian are gearing up for Fal.Con, CrowdStrike’s annual event taking place next week in Las Vegas. They’ll be recording a live episode on some fascinating LL…

00:17:33  |   Fri 12 Sep 2025
Live at Black Hat: What’s AI Really Capable Of?

Live at Black Hat: What’s AI Really Capable Of?

This year at Black Hat, the topic of AI was everywhere — from hallway chats to the expo floor. Adam and Cristian took a break from the action for a rare in-person conversation about how adversaries a…

00:33:45  |   Mon 18 Aug 2025
Cloud Intrusions Rise, eCrime Thrives, Governments Under Attack: CrowdStrike 2025 Threat Hunting Report

Cloud Intrusions Rise, eCrime Thrives, Governments Under Attack: CrowdStrike 2025 Threat Hunting Report

In the first half of 2025 alone, cloud intrusions were up 136% compared to all of 2024. China was a big driver — CrowdStrike saw a 40% year-over-year surge in intrusions from suspected cloud-consciou…

00:36:02  |   Mon 04 Aug 2025
The Return of SCATTERED SPIDER

The Return of SCATTERED SPIDER

They never really left — they just got quieter, faster, and bolder. In this episode of the Adversary Universe podcast, Adam and Cristian trace the resurgence of SCATTERED SPIDER, one of today’s most …

00:33:45  |   Thu 17 Jul 2025
Ask Us (Almost) Anything: Threat Intel, Adversaries, and More

Ask Us (Almost) Anything: Threat Intel, Adversaries, and More

You asked, and we answered. This episode of the Adversary Universe podcast takes a deep dive into questions from our listeners.

What did you want to know? Well, a lot about adversaries, but also abou…

00:25:13  |   Thu 03 Jul 2025
When the Adversary Shows Up in Person

When the Adversary Shows Up in Person

Physical security and IT security have gone hand in hand for a long time. While cybersecurity teams are rightfully focused on protecting their virtual environments, they should also have an eye on wh…

00:25:24  |   Thu 19 Jun 2025
Where AI Fits in the Adversary’s Toolbox

Where AI Fits in the Adversary’s Toolbox

Would you rather have an adversary profile you based on your AI chat history or tell your AI chatbot to forget everything it knows about you?

That’s one of many questions Adam and Cristian explore in…

00:20:31  |   Thu 05 Jun 2025
Catching Up on Cloud Attack Paths with Cloud Threat Specialist Sebastian Walla

Catching Up on Cloud Attack Paths with Cloud Threat Specialist Sebastian Walla

Today’s adversaries are increasingly operating in the cloud — and Sebastian Walla, Deputy Manager of Emerging Threats at CrowdStrike, is watching them. In this episode, he joins Adam and Cristian to …

00:28:53  |   Wed 28 May 2025
Inside the CrowdStrike 2025 Latin America Threat Landscape Report

Inside the CrowdStrike 2025 Latin America Threat Landscape Report

Latin America has become a hotspot for cyber activity. Threat actors around the world, particularly eCriminals, are targeting organizations operating in Central and South America, Mexico, and the Car…

00:20:49  |   Thu 08 May 2025
OCULAR SPIDER and the Rise of Ransomware-as-a-Service

OCULAR SPIDER and the Rise of Ransomware-as-a-Service

Ransomware has become more difficult for organizations to defend against, but easier for adversaries to deploy. The rise of ransomware-as-a-service (RaaS) — a model in which ransomware operators writ…

00:29:09  |   Thu 10 Apr 2025
Meet LUNAR SPIDER: The Inner Workings of an eCrime Adversary

Meet LUNAR SPIDER: The Inner Workings of an eCrime Adversary

To anticipate threat actors’ behavior, we must understand them. That’s why CrowdStrike closely tracks the evolution and activity of 257 named adversaries, including the eCrime actor LUNAR SPIDER.

“T…

00:23:44  |   Thu 27 Mar 2025
NSOCKS: Insights into a Million-Dollar Residential Proxy Service

NSOCKS: Insights into a Million-Dollar Residential Proxy Service

When an adversary wants to target an organization, they want to make it look like they’re coming from a regional or local internet service provider. This makes their activity seem more legitimate and…

00:31:21  |   Thu 13 Mar 2025
China’s Cyber Enterprise Grows: CrowdStrike 2025 Global Threat Report

China’s Cyber Enterprise Grows: CrowdStrike 2025 Global Threat Report

China’s cyber enterprise is rapidly growing: China-nexus activity was up 150% across industries in 2024, with a 200-300% surge in key sectors such as financial services, media, manufacturing, and ind…

00:34:00  |   Thu 27 Feb 2025
A Deep Dive into DeepSeek and the Risks of Foreign LLMs

A Deep Dive into DeepSeek and the Risks of Foreign LLMs

DeepSeek took the internet by storm earlier this year, making headlines and sparking conversations about its development, use, and associated risks. Today, Adam and Cristian take a deep dive into the…

00:27:26  |   Thu 20 Feb 2025
Putting a Spotlight on Energy Sector Threats with Corelight's Greg Bell

Putting a Spotlight on Energy Sector Threats with Corelight's Greg Bell

Cyberattacks targeting critical infrastructure have made more headlines in recent years, sparking concern about how these systems are protected. Adversaries are taking aim at older technologies that …

00:34:26  |   Thu 06 Feb 2025
See You I-Soon: A Peek at China’s Offensive Cyber Operations

See You I-Soon: A Peek at China’s Offensive Cyber Operations

“It would not be an understatement to say that China is the number one national security concern that I think we have here in the West.”

China’s offensive cyber activity has undergone a massive shift…

00:36:13  |   Thu 16 Jan 2025
The Most Prolific Adversaries and Threats of 2024

The Most Prolific Adversaries and Threats of 2024

It has been another busy year for defenders and adversaries alike. As we wrap up 2024, Adam and Cristian reflect on the nation-state and eCrime threat activity that defined this year and what they ex…

00:33:01  |   Thu 19 Dec 2024
Cross-Domain Attacks: Know Them, Find Them, Stop Them

Cross-Domain Attacks: Know Them, Find Them, Stop Them

Adversaries have realized their time-honored attack methods involving clunky malware and malicious attachments are no longer working, largely due to endpoint detection and response tools alerting sec…

00:40:00  |   Thu 12 Dec 2024
LIMINAL PANDA and the Implications of Global Telco Targeting

LIMINAL PANDA and the Implications of Global Telco Targeting

On Nov. 19, 2024, Adam testified in front of the U.S. Senate Judiciary Subcommittee on Privacy, Technology, and the Law on Chinese cyber threats to critical infrastructure. This was the first time he…

00:39:59  |   Wed 27 Nov 2024
Exploring Offensive Security with CrowdStrike Red Teamers

Exploring Offensive Security with CrowdStrike Red Teamers

If a business wants to know what an adversary might be capable of, they can seek the help of a red team. These cybersecurity professionals are tasked with emulating adversary activity to achieve spec…

00:47:39  |   Thu 07 Nov 2024
Disclaimer: The podcast and artwork embedded on this page are the property of CrowdStrike. This content is not affiliated with or endorsed by eachpod.com.