Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by Josh Stroschein. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Josh Stroschein or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

EP11 Tracing Lazarus: Greg Sinclair on Attributing North Korean Cyber Threats Through Binary Similarity

1:02:10
 
Share
 

Manage episode 490792272 series 3611794
Content provided by Josh Stroschein. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Josh Stroschein or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

Ever wonder who names the world's most notorious APTs? In this episode, we sit down with Greg Sinclair, a reverse engineer from the FLARE team at Google. Greg not only hunts down sophisticated malware but also shares the behind the scenes story of how he discovered and named the North Korean APT, the Lazarus Group. He also discusses his innovative methods for identifying malware families through binary similarities. Get ready for an inside look at the challenges, triumphs, and the sheer passion that defines a cutting-edge reverse engineer.

  continue reading

12 episodes

Artwork
iconShare
 
Manage episode 490792272 series 3611794
Content provided by Josh Stroschein. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Josh Stroschein or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

Ever wonder who names the world's most notorious APTs? In this episode, we sit down with Greg Sinclair, a reverse engineer from the FLARE team at Google. Greg not only hunts down sophisticated malware but also shares the behind the scenes story of how he discovered and named the North Korean APT, the Lazarus Group. He also discusses his innovative methods for identifying malware families through binary similarities. Get ready for an inside look at the challenges, triumphs, and the sheer passion that defines a cutting-edge reverse engineer.

  continue reading

12 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play