تنزيل التطبيق!
show episodes
 
Artwork

1
The Hacker's Cache

Kyser Clark - Cybersecurity

Unsubscribe
Unsubscribe
أسبوعيا
 
The show that decrypts the secrets of offensive cybersecurity, one byte at a time. Every week I invite you into the world of ethical hacking by interviewing leading offensive security practitioners. If you are a penetration tester, bug bounty hunter, red teamer, or blue teamer who wants to better understand the modern hacker mindset, whether you are new or experienced, this show is for you.
  continue reading
 
Artwork

1
BarCode

Chris Glanden

Unsubscribe
Unsubscribe
شهريا
 
Barcode is a cocktail powered podcast that dives into the technology, personalities, criminals, and heroes that have come to define modern security across the globe. Hosted by Chris Glanden.
  continue reading
 
Artwork

1
BrakeSec Education Podcast

Bryan Brake, Amanda Berlin, and Brian Boettcher

Unsubscribe
Unsubscribe
شهريا
 
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
  continue reading
 
Artwork

1
We think we know

Pentest-Tools.com

Unsubscribe
Unsubscribe
شهريا+
 
We think we know how computer systems work, but how come they keep surprising us? We also think we know how humans behave, but we keep finding out we don’t. This podcast is for ethical hackers who are thirsty for challenges and who never settle for easy answers. We challenge some of the best offensive security pros in the world to reveal the unique traits, skills, and real-world experiences that got them where they are today. Get ready to be caught off guard as we debunk misconceptions, diss ...
  continue reading
 
Artwork

1
7 Minute Security

Brian Johnson

Unsubscribe
Unsubscribe
أسبوعيا
 
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
  continue reading
 
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics. brad@securit360.com
  continue reading
 
Artwork
 
On WE’RE IN!, you'll hear from the newsmakers and innovators who are making waves and driving the cyber security industry forward. We talk to them about their stories, the future of the industry, their best practices, and more.
  continue reading
 
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
  continue reading
 
Join an all-star cast — including Dan DeCloss and Shawn Scott from PlexTrac, Paul Asadoorian and Tyler Robinson from Security Weekly, and Bryson Bort from SCYTHE — for a podcast mini-series focused on getting the real work done in cybersecurity. These four episodes will consider the perspectives of red, blue, and purple teamers alike in tracking signal through the noise to identify and prioritize the right things. Additionally, we’ll show off how PlexTrac empowers all types of security pros ...
  continue reading
 
Join an all-star cast — including Dan DeCloss and Shawn Scott from PlexTrac, Paul Asadoorian and Tyler Robinson from Security Weekly, and Bryson Bort from SCYTHE — for a podcast mini-series focused on getting the real work done in cybersecurity. These four episodes will consider the perspectives of red, blue, and purple teamers alike in tracking signal through the noise to identify and prioritize the right things. Additionally, we’ll show off how PlexTrac empowers all types of security pros ...
  continue reading
 
Artwork

1
CISO Tradecraft®

CISO Tradecraft®

Unsubscribe
Unsubscribe
أسبوعيا
 
Welcome to CISO Tradecraft®, your guide to mastering the art of being a top-tier Chief Information Security Officer (CISO). Our podcast empowers you to elevate your information security skills to an executive level. Join us on this journey through the domains of effective CISO leadership.
  continue reading
 
Artwork

1
The Treasury Update Podcast

Strategic Treasurer

Unsubscribe
Unsubscribe
أسبوعيا+
 
The Treasury Update Podcast is your source for interesting treasury news, in your car, at the gym, or wherever you decide to tune in! Strategic Treasurer was formed in 2004 to provide corporate, educational, and government entities direct access to comprehensive and current assistance with their treasury and financial technology, control and process efficiency requirements. Strategic Treasurer publishes content via newsletters, white-papers, blogs, videos, e-books, infographics, and analyst ...
  continue reading
 
SquareX is excited to launch The Be Fearless Podcast Series, where we bring together industry experts and professionals from the cybersecurity community. Hosted by SquareX Founder - and cybersecurity veteran - Vivek Ramachandran, look forward to insights about our guests’ journeys in security, the evolution of the field, the changing threatscape and how enterprises across industries are addressing them today.
  continue reading
 
Welcome to the Bug Hunter Podcast by Pentesterland, a podcast for pentesters & bug bounty hunters. We tackle technical questions & inspirational topics to help you develop both a hacker skillset & mindset.
  continue reading
 
Artwork

1
SOCTales

Matt Ford

Unsubscribe
Unsubscribe
شهريا
 
A new independent Podcast focusing on all things IT Security, although with a SOC focus. From Incident Response, Pen Testing, Ransomware and Digital Forensics, through to hiring, certification and recruitment. Enjoy a mix of up-to-date commentary and guest interviews with a few laughs and stories along the way.
  continue reading
 
Artwork

1
Security Sandbox

Relativity's Calder7

Unsubscribe
Unsubscribe
شهريا
 
It takes a lot to solve complex data problems securely. A sandbox is the perfect space to discover new approaches. In season two of Security Sandbox, Relativity CSO & CIO Amanda Fennell chats with guests about maximizing security's greatest asset—people—through meaningful use of technology and process, creative and compassionate training, and the conviction that there is room for taking risk in security.​
  continue reading
 
This Cyber Security podcast is intended to help people better protect themselves from Cyber criminals by offering quick tips, hacking news summaries and interviews with industry professionals. USB our Guest is the cyber security podcast you have been looking for. Offering quick tips and attack overviews 5-10 minutes in length intended to help people better protect themselves from Cyber criminals and 1-2hr interviews with industry professionals. From 2FA to Zero-Days and everything in between ...
  continue reading
 
Artwork

1
Humans of InfoSec

Humans of InfoSec

Unsubscribe
Unsubscribe
شهريا
 
A podcast that explores the stories of real people, their work, and its impact on the information security industry. Join security expert Caroline Wong as she focuses on the human side of security. Don't forget to follow the podcast on Twitter: https://twitter.com/humansofinfosec
  continue reading
 
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
  continue reading
 
Artwork

1
HackerHarbor Podcast

Yash Gorasiya, Anugrah SR, Meera Tamboli and Abhinav Pandey

Unsubscribe
Unsubscribe
يوميا+
 
The podcast that sails through the waters of hacking and cyber security, with Yash Gorasiya, Anugrah SR, Meera Tamboli, and Abhinav Pandey as your captains. Welcome to The HackerHarbor Podcast, your one-stop shop for all things cybersecurity! We dive deep into the world of cybersecurity, covering everything from essential topics for beginners to unique, untouched areas that impact the industry. Here's what you can expect: 🔹Career Guidance: Explore how to transition into cybersecurity or land ...
  continue reading
 
Loading …
show series
 
Text us feedback! In this episode, Spencer and Tyler share what they love and hate about the current state of penetration testing, they discuss current and future trends, and what it means to be a true cybersecurity partner. We hope you enjoy this episode! Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov Twitter: https://…
  continue reading
 
“You won't be replaced by AI, you'll be replaced by someone that uses AI.” At DEF CON 32, SquareX Product Evangelist Dakshitaa Babu talks to Offensive Security Expert Phillip Wylie about his cybersecurity journey, AI’s role in pentesting and more! 0:00 Introduction 0:41 Phillip’s journey from pro wrestling to cybersecurity 2:03 Phillip's work at Ho…
  continue reading
 
Join Audrey from our Founder’s Office and Black Hat Arsenal Co-Founder in this DEF CON 32 special episode of the Be Fearless Podcast! Rachid, who transitioned from a semiconductor background to cybersecurity, shares his journey and insights into the current security landscape. He also explains his work with Black Hat Arsenal, curating open-source s…
  continue reading
 
We sat down with Cassie Crosley to explore the complexities of supply chain risks, particularly within the realm of operational technology (OT). Comprehensive Supply Chain Security - Crosley detailed the various stages in the supply chain—design, development, and fabrication—where both deliberate and accidental abuses can occur. Each stage presents…
  continue reading
 
Kyser Clark interviews Jacob Villarreal, a penetration tester, about his journey into the cybersecurity field, his experiences at DEFCON, and various topics related to cybersecurity. Jacob shares his background, including his education, certifications, and transition from IT roles to penetration testing. The discussion covers the importance of netw…
  continue reading
 
In this DEF CON 32 special, Vangelis Stykas, CTO and co-founder of ATROPOS.ai, shares his research on hacking on ransomware panels, revealing how difficult they are to disrupt — in fact, ransomware groups are more secure than Fortune 500 companies! Hosted by Product Evangelist Dakshitaa Babu, he also discusses his fascinating research on how electr…
  continue reading
 
We sat down with Tim Conway and Robert Lee, two leading cybersecurity experts, to discuss pressing issues in OT cybersecurity. CrowdStrike Lessons Learned Tim and Robert began by examining the CrowdStrike incident from July 2024. They highlighted the dangers of over-relying on trusted technology without sufficient testing and verification, and the …
  continue reading
 
Ron Cole of Immersive Labs joins us to talk pentest war stories, essential skills he learned while serving on a SOC, and the various pentest training and range platforms you can use to sharpen your security skills! Here are the links Ron shared during our discussion: VetSec Fortinet Veterans Program Immersive Labs Cyber Million FedVTE…
  continue reading
 
In this episode, Craig Jeffery and Kate Pohl explore the role of the Euro Banking Association (EBA) and what corporate treasury can learn from it. They discuss EBA’s functions and its impact on the banking industry. Kate also shares how corporations in North America can engage with the EBA and benefit from its resources. LINKS: If you are not famil…
  continue reading
 
Join G. Mark Hardy in Torremolinos, Spain, for a deep dive into the security of Generative AI. This episode of CISO Tradecraft explores the basics of generative AI, including large language models like ChatGPT, and discusses the key risks and mitigation strategies for securing AI tools in the workplace. G. Mark provides real-world examples, insight…
  continue reading
 
This episode dives into OT Cybersecurity and discusses: SCADA, ICS & IIoT Cybersecurity How do we define an OT-related cyber incident? What are the leading standards and guidelines for managing OT Cybersecurity and resilience? Threat intelligence and suitable ISAC models Vendor platform insights and cyber maturity landscape Speakers include: Daniel…
  continue reading
 
In this DEF CON 32 special, Michael Kouremetis, Principal Adversary Emulation Engineer from MITRE discusses the Caldera project, research on LLMs and their implications for cybersecurity. If you’re interested in the intersection of AI and cybersecurity, this is one episode you don’t want to miss! 0:00 Introduction and the story behind Caldera 2:40 …
  continue reading
 
"I found multiple demo versions available without any authentication. I went there, extracted all the requests, and fuzzed all the parameters for SQL injection. Then I changed the domain to the in-scope domain of the company I was hacking and ran SQL commands to dump their database." Hear from Nikhil “Niks” Srivastava bug bounty hunter and founder …
  continue reading
 
Jen, a former military professional turned hacker, shares her journey into cybersecurity and her experiences with the Synack Red Team in the latest episode of WE’RE IN! She transitioned from fixing security issues to actively seeking vulnerabilities, inspired by her brother and motivated by her experiences at the storied hacker conference, DEF CON.…
  continue reading
 
Kyser Clark interviews Trent Darrow, a senior penetration tester and cyber protection team crew lead. They discuss Trent's background, certifications, and his role in building a red team. They also touch on ethical dilemmas in the industry, the effectiveness of certifications in preparing for real-world pen testing, and the importance of skills lik…
  continue reading
 
Text us feedback! In this episode, Tyler and Brad talk about various security issues found on recent penetration tests. They outline the how and why, and talk about mitigation strategies to help you beat these issues in your environment. Resources Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov Twitter: https://twitter.c…
  continue reading
 
In this episode, Craig Jeffery and Royston Da Costa discuss how generative AI, machine learning (ML), and robotic process automation (RPA) are transforming treasury functions. They provide real-world examples of current applications, discuss expected trends for the next 2-3 years, and explore emerging technologies like ChatGPT, Microsoft Copilot, a…
  continue reading
 
G Mark Hardy dives deep into effective strategies for securing your business. Learn why it's essential for cybersecurity leaders to communicate the real business impact of vulnerabilities and discover the importance of identifying and prioritizing critical business processes. Gain insights from historical references and practical frameworks like th…
  continue reading
 
Today we’re revisiting the fun world of automating pentest dropboxes using Proxmox, Ansible, Cursor and Level. Plus, a tease about how all this talk about automation is getting us excited for a long-term project: creating a free/community edition of Light Pentest LITE training!
  continue reading
 
Mohit Tiwari, co-founder and CEO of Symmetry Systems, joins Vivek and Aleksandra in this DEF CON 32 Special Episode of our podcast! Hear directly from him on his journey towards entrepreneurship, how Symmetry Systems (https://www.symmetry-systems.com) solves modern data security problems, practical advice for those wishing to start their own compan…
  continue reading
 
Kyser Clark and Evan Isaac discuss their experiences and insights in cybersecurity. They cover topics such as certifications, content creation on LinkedIn, web hacking resources, job searching advice, and the importance of offensive and defensive cybersecurity skills. Connect with Evan Isaac on LinkedIn: https://www.linkedin.com/in/evan-isaac/ Take…
  continue reading
 
Text us feedback! In this episode, Spencer and Brad dive into lateral movement, discussing various techniques like RDP, RATs, Impacket tools, PsExec, PTH, PTT, and PowerShell Remoting. They explain how attackers use these methods to gain unauthorized access, evade detection, and enable malicious activities. They also discuss precursors to lateral m…
  continue reading
 
In this episode, Craig Jeffery, Managing Partner of Strategic Treasurer, and Susan Nichols, VP, B2B Payments Product and Business Management at Deluxe, explore effective change management for digital payments. They discuss balancing technology upgrades with managing internal and external changes, securing executive buy-in, and integrating digital s…
  continue reading
 
Join host G Mark Hardy as he dives deep into the complexities of compliance and reporting, featuring special guests Brian Bradley and Josh Williams from FedShark. Discover a unique and streamlined approach to compliance using FedShark's innovative tools and AI-assisted systems. Learn about their exclusive offers for CISO Tradecraft listeners, inclu…
  continue reading
 
Get an insider’s view of how the famed Black Hat cybersecurity conference is run from Steve Wylie, General Manager of Black Hat himself! In this episode, Vivek and Aleksandra have a conversation with Steve on how Black Hat is organized, the associated challenges and highlights and the important role of entrepreneurship within the cybersecurity comm…
  continue reading
 
In March 2024, the Australian Senate resolved that the Select Committee on Adopting Artificial Intelligence (AI) be established to inquire into and report on the opportunities and impacts for Australia arising out of the uptake of AI technologies in Australia. The committee intends to report to the Parliament on or before 19 September 2024. More th…
  continue reading
 
This was my favorite pentest tale of pwnage to date! There’s a lot to cover in this episode so I’m going to try and bullet out the TLDR version here: Sprinkled farmer files around the environment Found high-priv boxes with WebClient enabled Added “ghost” machine to the Active Directory (we’ll call it GHOSTY) RBCD attack to be able to impersonate a …
  continue reading
 
Text us feedback! In our "DNS Security" podcast, we delve into DNS's critical role in how the internet works, exploring its vulnerabilities and attacks like DNS spoofing, cache poisoning, and DDoS. We discuss DNSSEC and its components, including public and private keys, and examine practical solutions such as DNS and content filtering. The episode …
  continue reading
 
Loading …

دليل مرجعي سريع