
Security Unlocked presents The BlueHat Podcast
From 2020 to 2022, Security Unlocked, hosted by Nic Fillingham and Natalia Godyla, explored the technology and people powering Microsoft's Security solutions.
Today, the Security Unlocked feed brings you new episodes from The BlueHat Podcast where hosts Nic Fillingham and Wendy Zenone speak with security researchers, responders, hackers and industry leaders, both inside and outside of Microsoft, working to secure the planet's technology and create a safer world for all.
Hosted on Acast. See acast.com/privacy for more information.
©2024 Microsoft
Jul 9, 2025Recent reviews on Apple Podcasts (5)
Interesting content and great hosts
Super engaging and relevant content for Security professionals of all tenure. Knowledgeable and personable hosts.
CaitlinMF ·
Excellent Security Podcast
Excellent storytelling told by some of the most informed and passionate security professionals in the industry.
KikiBooILU ·
Very painful to listen to
Content might be interesting but fire the hosts into the moon
A concerned ex-user ·
Terrible
Not worth your time. Barely scratch the surface tech content with hosts that are simply hard to listen to.
simplyhonest1234 ·
Great insights
Each episode is a great blend of depth for the security savvy, and breakdowns of technical concepts that make them accessible to anyone who is just curious about security.
.-ryan-. ·
Episodes (67)

Hunting Variants: Finding the Bugs Behind the Bug
Jul 9, 202539m#66
In this episode of The BlueHat Podcast, host Nic Fillingham is joined by George Hughey from Microsoft who returns to discuss his Blue Hat India talk on variant hunting, explaining how MSRC uses submission data from hacki

Securing Redirections with Mike Macelletti
Jun 25, 202541m#65
In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone are joined by Mike Macelletti from Microsoft’s MSRC Vulnerabilities and Mitigations team to explore Redirection Guard, a powerful mitigation de

Ignore Ram Shankar Siva Kumar’s Previous Directions
Jun 11, 202539m#64
In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone share Ram Shankar Siva Kumar’s dynamic keynote from BlueHat India 2025, where he explores the evolving threat landscape of AI through the lens

Protecting AI at the Edge with David Weston
May 28, 202538m#63
In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone share David Weston’s keynote from BlueHat India 2025. David explores the growing role of on-device AI in Windows, the security risks it introdu

Hacking at the Weeds with Felix Boulet
May 14, 202532m#62
In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone are joined by Felix Boulet fresh off his participation in Zero Day Quest. Felix talks about his unique journey from industrial maintenance to b

Evolutions in Hacking with Marco Ivaldi
Apr 30, 202548m#61
In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone are joined by Marco Ivaldi , co-founder and technical director of HN Security, a boutique company specializing in offensive security services,

From Facebook-Phished to MVR Top 5 with Dhiral Patel
Apr 16, 202541m#60
In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone are joined by Dhiral Patel , Senior Security Engineer at ZoomInfo and one of MSRC’s Most Valuable Researchers (MVR). Dhiral shares how a hacked

AI & the Hunt for Hidden Vulnerabilities with Tobias Diehl
Apr 2, 202533m#59
In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone are joined by security researcher Tobias Diehl , a top contributor to the Microsoft Security Research Center (MSRC) leaderboards and a Most Val

Cryptojacking, and Farewell for Now!
Feb 16, 202235m#58
The success of crypto inspired dozens of other cryptocurrencies like Ethereum, Tether, and Dogecoin. Today, people worldwide use cryptocurrencies to buy things, sell things, and make investments. One thing is certain; di

A look at Cybercrime in 2021
Feb 2, 202241m#57
Ransomware attacks have never been so successful. The returns from these attacks are soaring and only becoming easier to conduct. In chapter two of the Microsoft Digital Defense Report, the growing threat of cybercrime i

What’s a BISO?
Jan 19, 202239m#56
Everything is exciting and new when you're a kid, and curiosity inspires many of us to branch out and try new things. For some, that means drawing from our imagination or trying all kinds of sports. And for others it mea

Disinformation in the Enterprise
Jan 5, 202235m#55
Disinformation refers to the calculated use of false information to influence others and has been a steadily growing form of information warfare. Unfortunately, disinformation is everywhere these days, often hidden in pl

I am Shroot-less
Dec 22, 202136m#54
Microsoft works around the clock to protect their customers, no matter what product they’re using, Microsoft or otherwise. In some instances Microsoft teams up with other companies, creating an all-star cybersecurity tea

Decoding NOBELIUM
Dec 8, 202148m#53
In December 2020, Microsoft began sharing information with the cybersecurity industry on a group of Russia-based hackers who gained access to multiple enterprises through vulnerable software code, stolen passwords, compr

Trusting Your Hybrid Workforce
Nov 24, 202141m#52
We are back, covering more of the 2021 Microsoft Digital Defense Report, and this time we’re taking a deep dive into chapter five on Hybrid Workforce Security and Zero Trust. Zero Trust means precisely what it sounds lik

When Privacy Meets Security
Nov 10, 202138m#51
The way most people operate online these days, what would you even consider private anymore? We are so quick to share details about our job, home, friends, and family without even thinking about how much personal info we

Securing Modern Software
Oct 27, 202121m#50
The newfound popularity of the internet in the nineties spurned an obsession with hacking. Unfortunately, most movies believed that it wasn't possible to show real hacking and still be entertaining; hence all the awkward

The 2021 Microsoft Digital Defense Report
Oct 20, 202139m#49
Okay, look, we know you plan on reading the entire 2021 MDDR at some point. But you're busy. Life gets in the way. We get it. Who has the time! Well, we've got the time, but that's beside the point, and honestly... fortu

Mobile 4N6 101
Oct 13, 202134m#48
What would you say is the most personal possession that you own? Most would say their cell phone... unless you still have a few journals from high school. And if you do, this is your reminder that it might be time to let

Untangling Botnets
Oct 6, 202137m#47
You're back home celebrating the holidays with friends and family, sharing stories, catching up, and discussing your plans for the year ahead. Next thing you know, that cousin who wouldn't stop sending you emails about t

What the Fuzz?!
Sep 29, 202136m#46
Do you have a data science or engineering background? If so, you're in luck. If not, you're also in luck because today's guest found a way to make a few complex subjects understandable for everyone. The first of many top

The ‘Three E’s’ of Scam Disruption
Sep 22, 202135m#45
Juan Hardoy leads an international team of investigators, analysts, and lawyers inside the Digital Crimes Unit who share a joint mission to protect customers and promote trust in Microsoft technologies. Hearing that migh

Entering the Virtual Battlefield
Sep 15, 202135m#44
Have you ever thought about a career in threat intelligence or cyber security? Possibly finishing school with a degree in computer programming and feel overwhelmed with what to do next? Don't worry; we've all experienced

Battling BazaCall BuzzKill
Sep 1, 202135m#43
It's finally Friday. You successfully made it through another week and the weekend is so close you can taste it. You pour yourself a bowl of your favorite cereal, but before you can get that first bite your phone rings.

Turning to the Purple Side
Aug 25, 202124m#42
Picture this: you’re working on a new software that will revolutionize your industry. You’ve got your work cut out for you, from design to programming to integration. But what about security? Keeping your software secure