Episode 66 — Malware I: Types, Vectors, and Evasion
Malware is a constant in cybersecurity, and this episode breaks down its many forms, how it spreads, and how it hides. You’ll learn the defining characteristics of viruses, worms, trojans, rootkits, and fileless malware, along with how each exploits different weaknesses in operating systems and users. We explore infection vectors ranging from malicious attachments to drive-by downloads and compromised supply chains, illustrating how attackers chain small errors into major breaches. The conversation also introduces evasion tactics—obfuscation, polymorphism, and living-off-the-land techniques—that make modern threats harder to detect.
Listeners will gain context on how defenders identify, classify, and respond to emerging threats. The episode explains how sandboxing, heuristics, and behavioral analysis complement traditional signature detection to uncover new variants. We also discuss how adversaries exploit trust in digital signatures or legitimate administration tools to blend into normal activity. By the end, you’ll understand how the GSEC exam expects you to reason through the lifecycle of a malicious program—from introduction to execution to containment—and why vigilance begins with knowing what “normal” looks like. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.