Trawling the honeypot: What it’s like to discover a new malware strain

Being a malware reverse engineer isn’t always glamorous work. You spend a lot of time digging through junk emails.

But when you find something in there—well, that’s a whole different story.

On this episode of Security Intelligence, X-Force Malware Reverse Engineer Raymond Joseph Alfonso tells us about the time he discovered a curious new malware loader in the honeypot. And that leads to a bigger conversation about how hackers hide malicious code from view—and some of the new techniques they’re cooking up to stay hidden.

The opinions expressed in this podcast are solely those of the participants and do not necessarily reflect the views of IBM or any other organization or entity.

Subscribe now on your favorite platform YouTube Spotify Apple Podcasts Casted
Close-up of a person writing code on a laptop
We can't stop social engineering for good, but we can fight back Why does social engineering work?
Team of programmers in data center
What is social engineering?
An email that seems to be from a trusted coworker requesting sensitive information and a threatening voicemail claiming to be from the IRS are just a few examples of social engineering.
Laptop with binary codes on screen at desk
What is cybersecurity?
By one estimate, cybercrime will cost the world economy USD 10.5 trillion per year by 2025.
What is cloud security?
Dive deep with Nataraj Nagaratnam from IBM Cloud® as he explains cloud security and how enterprises can incorporate it into their business operations.
You might like
3D render of translucent cubes
Cost of a Data Breach Report 2025
Artwork for the X-Force 2025 thought leadership
IBM X-Force® 2025 Threat Intelligence Index
Cost of a Data Breach Report 2025 artwork
Cost of a Data Breach Report 2025

Latest podcast episodes

Follow us

Follow us on Apple Podcasts and Spotify.

Catch every episode
Footnotes

{1 Report title, Publisher, XX Month XXXX}