
Sign up to save your podcasts
Or
In this episode of the Microsoft Threat Intelligence Podcast, host Sherrod DeGrippo is joined by Henning Rauch, to discuss Call of the Cyber Duty is a 42-hour global cybersecurity challenge hosted by Microsoft’s Kusto Detective Agency. The competition runs from 12:00 AM Coordinated Universal Time (UTC) on June 8, 2025, and ends at 12:00 AM UTC on June 18, 2025, at 10:00AM UTC. Once a team member opens the first case, they have 42 hours to complete it.Participants will solve a series of investigative puzzles using Kusto Query Language (KQL) — no prior Kusto experience required.
This free, gamified threat-hunting experience is open to individuals and teams, with a $10,000 grand prize, an interactive mystery plot, and a Hall of Fame for the top solvers. Expect fun twists, real-world security skills, and even a surprise appearance by mentalist Lior Suchard or the illusive Professor Smoke!
Later in the episode, Sherrod is joined by security researchers Anna Seitz and Rebecca Light to explore two evolving cyber threats. Anna breaks down the unprecedented collaboration between Russian state-affiliated threat actors Aqua Blizzard and Secret Blizzard, who are combining efforts to target Ukrainian military systems. Rebecca dives into the resurgence of DarkGate malware—this time delivered through a deceptive technique called ClickFix, which uses fake CAPTCHA-like prompts to trick users into activating malicious payloads.
In this episode you’ll learn:
What Kauzar V2 malware is and how it enables long-term remote access and data theft
How Russian threat groups Aqua Blizzard and Secret Blizzard are collaborating
Why DarkGate malware remains relevant thanks to its adaptability and evasion tactics
Some questions we ask:
Are Russian threat actors adopting cybercriminal tactics like initial access brokers?
How does Kauzar V2 malware function, and why is it significant in this campaign?
What is ClickFix, and how does it differ from typical malware delivery methods?
Resources:
View Henning Rauch on LinkedIn
View Rebecca Light on LinkedIn
View Anna Seitz on LinkedIn
View Sherrod DeGrippo on LinkedIn
🕵️♀️ Register for the challenge (free!)
https://detective.kusto.io/register
🎬 Official trailer featuring Lior Suchard
https://youtu.be/sPmTX0ZrnE
🌐 Event homepage (info hub)
https://detective.kusto.io
Related Microsoft Podcasts:
Afternoon Cyber Tea with Ann Johnson
The BlueHat Podcast
Uncovering Hidden Risks
Discover and follow other Microsoft podcasts at microsoft.com/podcasts
Get the latest threat intelligence insights and guidance at Microsoft Security Insider
The Microsoft Threat Intelligence Podcast is produced by Microsoft and distributed as part of N2K media network.
5
1919 ratings
In this episode of the Microsoft Threat Intelligence Podcast, host Sherrod DeGrippo is joined by Henning Rauch, to discuss Call of the Cyber Duty is a 42-hour global cybersecurity challenge hosted by Microsoft’s Kusto Detective Agency. The competition runs from 12:00 AM Coordinated Universal Time (UTC) on June 8, 2025, and ends at 12:00 AM UTC on June 18, 2025, at 10:00AM UTC. Once a team member opens the first case, they have 42 hours to complete it.Participants will solve a series of investigative puzzles using Kusto Query Language (KQL) — no prior Kusto experience required.
This free, gamified threat-hunting experience is open to individuals and teams, with a $10,000 grand prize, an interactive mystery plot, and a Hall of Fame for the top solvers. Expect fun twists, real-world security skills, and even a surprise appearance by mentalist Lior Suchard or the illusive Professor Smoke!
Later in the episode, Sherrod is joined by security researchers Anna Seitz and Rebecca Light to explore two evolving cyber threats. Anna breaks down the unprecedented collaboration between Russian state-affiliated threat actors Aqua Blizzard and Secret Blizzard, who are combining efforts to target Ukrainian military systems. Rebecca dives into the resurgence of DarkGate malware—this time delivered through a deceptive technique called ClickFix, which uses fake CAPTCHA-like prompts to trick users into activating malicious payloads.
In this episode you’ll learn:
What Kauzar V2 malware is and how it enables long-term remote access and data theft
How Russian threat groups Aqua Blizzard and Secret Blizzard are collaborating
Why DarkGate malware remains relevant thanks to its adaptability and evasion tactics
Some questions we ask:
Are Russian threat actors adopting cybercriminal tactics like initial access brokers?
How does Kauzar V2 malware function, and why is it significant in this campaign?
What is ClickFix, and how does it differ from typical malware delivery methods?
Resources:
View Henning Rauch on LinkedIn
View Rebecca Light on LinkedIn
View Anna Seitz on LinkedIn
View Sherrod DeGrippo on LinkedIn
🕵️♀️ Register for the challenge (free!)
https://detective.kusto.io/register
🎬 Official trailer featuring Lior Suchard
https://youtu.be/sPmTX0ZrnE
🌐 Event homepage (info hub)
https://detective.kusto.io
Related Microsoft Podcasts:
Afternoon Cyber Tea with Ann Johnson
The BlueHat Podcast
Uncovering Hidden Risks
Discover and follow other Microsoft podcasts at microsoft.com/podcasts
Get the latest threat intelligence insights and guidance at Microsoft Security Insider
The Microsoft Threat Intelligence Podcast is produced by Microsoft and distributed as part of N2K media network.
1,972 Listeners
361 Listeners
628 Listeners
366 Listeners
1,007 Listeners
311 Listeners
400 Listeners
927 Listeners
7,864 Listeners
171 Listeners
187 Listeners
315 Listeners
74 Listeners
129 Listeners
33 Listeners