The show that decrypts the secrets of offensive cybersecurity, one byte at a time. Every week I invite you into the world of ethical hacking by interviewing leading offensive security practitioners. If you are a penetration tester, bug bounty hunter, red teamer, or blue teamer who wants to better understand the modern hacker mindset, whether you are new or experienced, this show is for you.
…
continue reading
Barcode is a cocktail powered podcast that dives into the technology, personalities, criminals, and heroes that have come to define modern security across the globe. Hosted by Chris Glanden.
…
continue reading
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
…
continue reading
We think we know how computer systems work, but how come they keep surprising us? We also think we know how humans behave, but we keep finding out we don’t. This podcast is for ethical hackers who are thirsty for challenges and who never settle for easy answers. We challenge some of the best offensive security pros in the world to reveal the unique traits, skills, and real-world experiences that got them where they are today. Get ready to be caught off guard as we debunk misconceptions, diss ...
…
continue reading
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
…
continue reading
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics. brad@securit360.com
…
continue reading
On WE’RE IN!, you'll hear from the newsmakers and innovators who are making waves and driving the cyber security industry forward. We talk to them about their stories, the future of the industry, their best practices, and more.
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
Join an all-star cast — including Dan DeCloss and Shawn Scott from PlexTrac, Paul Asadoorian and Tyler Robinson from Security Weekly, and Bryson Bort from SCYTHE — for a podcast mini-series focused on getting the real work done in cybersecurity. These four episodes will consider the perspectives of red, blue, and purple teamers alike in tracking signal through the noise to identify and prioritize the right things. Additionally, we’ll show off how PlexTrac empowers all types of security pros ...
…
continue reading
Join an all-star cast — including Dan DeCloss and Shawn Scott from PlexTrac, Paul Asadoorian and Tyler Robinson from Security Weekly, and Bryson Bort from SCYTHE — for a podcast mini-series focused on getting the real work done in cybersecurity. These four episodes will consider the perspectives of red, blue, and purple teamers alike in tracking signal through the noise to identify and prioritize the right things. Additionally, we’ll show off how PlexTrac empowers all types of security pros ...
…
continue reading
Welcome to CISO Tradecraft®, your guide to mastering the art of being a top-tier Chief Information Security Officer (CISO). Our podcast empowers you to elevate your information security skills to an executive level. Join us on this journey through the domains of effective CISO leadership.
…
continue reading
The Treasury Update Podcast is your source for interesting treasury news, in your car, at the gym, or wherever you decide to tune in! Strategic Treasurer was formed in 2004 to provide corporate, educational, and government entities direct access to comprehensive and current assistance with their treasury and financial technology, control and process efficiency requirements. Strategic Treasurer publishes content via newsletters, white-papers, blogs, videos, e-books, infographics, and analyst ...
…
continue reading
SquareX is excited to launch The Be Fearless Podcast Series, where we bring together industry experts and professionals from the cybersecurity community. Hosted by SquareX Founder - and cybersecurity veteran - Vivek Ramachandran, look forward to insights about our guests’ journeys in security, the evolution of the field, the changing threatscape and how enterprises across industries are addressing them today.
…
continue reading
Information security with a whiskey filter.
…
continue reading
Cybersecurity career, technology, and success tips.
…
continue reading
David Bombal interviews people in the networking world to learn about life, hacks, technology and networking and ways to improve your life!
…
continue reading
Your anything goes security podcast presented to you by Black Lantern Security
…
continue reading
Welcome to the Bug Hunter Podcast by Pentesterland, a podcast for pentesters & bug bounty hunters. We tackle technical questions & inspirational topics to help you develop both a hacker skillset & mindset.
…
continue reading
A new independent Podcast focusing on all things IT Security, although with a SOC focus. From Incident Response, Pen Testing, Ransomware and Digital Forensics, through to hiring, certification and recruitment. Enjoy a mix of up-to-date commentary and guest interviews with a few laughs and stories along the way.
…
continue reading
It takes a lot to solve complex data problems securely. A sandbox is the perfect space to discover new approaches. In season two of Security Sandbox, Relativity CSO & CIO Amanda Fennell chats with guests about maximizing security's greatest asset—people—through meaningful use of technology and process, creative and compassionate training, and the conviction that there is room for taking risk in security.
…
continue reading
This Cyber Security podcast is intended to help people better protect themselves from Cyber criminals by offering quick tips, hacking news summaries and interviews with industry professionals. USB our Guest is the cyber security podcast you have been looking for. Offering quick tips and attack overviews 5-10 minutes in length intended to help people better protect themselves from Cyber criminals and 1-2hr interviews with industry professionals. From 2FA to Zero-Days and everything in between ...
…
continue reading
A podcast that explores the stories of real people, their work, and its impact on the information security industry. Join security expert Caroline Wong as she focuses on the human side of security. Don't forget to follow the podcast on Twitter: https://twitter.com/humansofinfosec
…
continue reading
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
…
continue reading
The podcast that sails through the waters of hacking and cyber security, with Yash Gorasiya, Anugrah SR, Meera Tamboli, and Abhinav Pandey as your captains. Welcome to The HackerHarbor Podcast, your one-stop shop for all things cybersecurity! We dive deep into the world of cybersecurity, covering everything from essential topics for beginners to unique, untouched areas that impact the industry. Here's what you can expect: 🔹Career Guidance: Explore how to transition into cybersecurity or land ...
…
continue reading
1
7MS #643: DIY Pentest Dropbox Tips – Part 11
26:40
26:40
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
26:40
Today we continue where we left off in episode 641, but this time talking about how to automatically deploy and install a Ubuntu-based dropbox! I also share some love for exegol as an all-in-one Active Directory pentesting platform.
…
continue reading
1
Episode 109: Current State of Pentesting - Internal and External
39:41
39:41
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
39:41
Text us feedback! In this episode, Spencer and Tyler share what they love and hate about the current state of penetration testing, they discuss current and future trends, and what it means to be a true cybersecurity partner. We hope you enjoy this episode! Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov Twitter: https://…
…
continue reading
1
AI and Automation in Pentesting | Phillip Wylie | Be Fearless Podcast EP 12
14:23
14:23
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
14:23
“You won't be replaced by AI, you'll be replaced by someone that uses AI.” At DEF CON 32, SquareX Product Evangelist Dakshitaa Babu talks to Offensive Security Expert Phillip Wylie about his cybersecurity journey, AI’s role in pentesting and more! 0:00 Introduction 0:41 Phillip’s journey from pro wrestling to cybersecurity 2:03 Phillip's work at Ho…
…
continue reading
1
Coffee Break Session #118: What Is a Pentest?
8:24
8:24
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
8:24
In today’s episode, we’ll hear from Craig Jeffery on pentests. What are they, who performs them, and why are they vital for cyber security? Listen in to learn more.
…
continue reading
1
From Semiconductors to Co-founding Black Hat Arsenal | Rachid Harrando | Be Fearless Podcast EP 14
14:51
14:51
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
14:51
Join Audrey from our Founder’s Office and Black Hat Arsenal Co-Founder in this DEF CON 32 special episode of the Be Fearless Podcast! Rachid, who transitioned from a semiconductor background to cybersecurity, shares his journey and insights into the current security landscape. He also explains his work with Black Hat Arsenal, curating open-source s…
…
continue reading
1
Episode 415 - The Risk Story – Software Supply Chain Security
22:13
22:13
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
22:13
We sat down with Cassie Crosley to explore the complexities of supply chain risks, particularly within the realm of operational technology (OT). Comprehensive Supply Chain Security - Crosley detailed the various stages in the supply chain—design, development, and fabrication—where both deliberate and accidental abuses can occur. Each stage presents…
…
continue reading
1
#14 Social Engineering Unleashed: DEF CON Insights from Jacob Villarreal
34:24
34:24
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
34:24
Kyser Clark interviews Jacob Villarreal, a penetration tester, about his journey into the cybersecurity field, his experiences at DEFCON, and various topics related to cybersecurity. Jacob shares his background, including his education, certifications, and transition from IT roles to penetration testing. The discussion covers the importance of netw…
…
continue reading
1
Hacking EVs and Photovoltaic Systems | Vangelis Stykas | Be Fearless Podcast EP 13
8:45
8:45
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
8:45
In this DEF CON 32 special, Vangelis Stykas, CTO and co-founder of ATROPOS.ai, shares his research on hacking on ransomware panels, revealing how difficult they are to disrupt — in fact, ransomware groups are more secure than Fortune 500 companies! Hosted by Product Evangelist Dakshitaa Babu, he also discusses his fascinating research on how electr…
…
continue reading
1
Episode 414 - Winning the OT Security Battle
28:09
28:09
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
28:09
We sat down with Tim Conway and Robert Lee, two leading cybersecurity experts, to discuss pressing issues in OT cybersecurity. CrowdStrike Lessons Learned Tim and Robert began by examining the CrowdStrike incident from July 2024. They highlighted the dangers of over-relying on trusted technology without sufficient testing and verification, and the …
…
continue reading
1
7MS #642: Interview with Ron Cole of Immersive Labs
42:00
42:00
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
42:00
Ron Cole of Immersive Labs joins us to talk pentest war stories, essential skills he learned while serving on a SOC, and the various pentest training and range platforms you can use to sharpen your security skills! Here are the links Ron shared during our discussion: VetSec Fortinet Veterans Program Immersive Labs Cyber Million FedVTE…
…
continue reading
1
What Can Corporate Treasury Learn from the EBA?
21:52
21:52
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
21:52
In this episode, Craig Jeffery and Kate Pohl explore the role of the Euro Banking Association (EBA) and what corporate treasury can learn from it. They discuss EBA’s functions and its impact on the banking industry. Kate also shares how corporations in North America can engage with the EBA and benefit from its resources. LINKS: If you are not famil…
…
continue reading
Join G. Mark Hardy in Torremolinos, Spain, for a deep dive into the security of Generative AI. This episode of CISO Tradecraft explores the basics of generative AI, including large language models like ChatGPT, and discusses the key risks and mitigation strategies for securing AI tools in the workplace. G. Mark provides real-world examples, insight…
…
continue reading
1
Episode 413 - Operational Technology (OT) Cybersecurity - Episode 4
1:00:06
1:00:06
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:00:06
This episode dives into OT Cybersecurity and discusses: SCADA, ICS & IIoT Cybersecurity How do we define an OT-related cyber incident? What are the leading standards and guidelines for managing OT Cybersecurity and resilience? Threat intelligence and suitable ISAC models Vendor platform insights and cyber maturity landscape Speakers include: Daniel…
…
continue reading
1
Using LLMs for Offensive Cybersecurity | Michael Kouremetis | Be Fearless Podcast EP 11
9:46
9:46
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
9:46
In this DEF CON 32 special, Michael Kouremetis, Principal Adversary Emulation Engineer from MITRE discusses the Caldera project, research on LLMs and their implications for cybersecurity. If you’re interested in the intersection of AI and cybersecurity, this is one episode you don’t want to miss! 0:00 Introduction and the story behind Caldera 2:40 …
…
continue reading
1
With Bug Bounty Expert Niks | Be Fearless Podcast EP 10
11:30
11:30
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
11:30
"I found multiple demo versions available without any authentication. I went there, extracted all the requests, and fuzzed all the parameters for SQL injection. Then I changed the domain to the in-scope domain of the company I was hacking and ran SQL commands to dump their database." Hear from Nikhil “Niks” Srivastava bug bounty hunter and founder …
…
continue reading
1
Jennifer Villarreal on how she upped her hacking game
30:45
30:45
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
30:45
Jen, a former military professional turned hacker, shares her journey into cybersecurity and her experiences with the Synack Red Team in the latest episode of WE’RE IN! She transitioned from fixing security issues to actively seeking vulnerabilities, inspired by her brother and motivated by her experiences at the storied hacker conference, DEF CON.…
…
continue reading
1
#13 Hacking Time: Real World Skills They Don't Teach You | Trent Darrow
39:32
39:32
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
39:32
Kyser Clark interviews Trent Darrow, a senior penetration tester and cyber protection team crew lead. They discuss Trent's background, certifications, and his role in building a red team. They also touch on ethical dilemmas in the industry, the effectiveness of certifications in preparing for real-world pen testing, and the importance of skills lik…
…
continue reading
1
Episode 108: New tales from the trenches!
38:38
38:38
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
38:38
Text us feedback! In this episode, Tyler and Brad talk about various security issues found on recent penetration tests. They outline the how and why, and talk about mitigation strategies to help you beat these issues in your environment. Resources Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov Twitter: https://twitter.c…
…
continue reading
1
Exploring Generative AI, ML, and RPA in Treasury with Royston Da Costa
40:18
40:18
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
40:18
In this episode, Craig Jeffery and Royston Da Costa discuss how generative AI, machine learning (ML), and robotic process automation (RPA) are transforming treasury functions. They provide real-world examples of current applications, discuss expected trends for the next 2-3 years, and explore emerging technologies like ChatGPT, Microsoft Copilot, a…
…
continue reading
1
#198 - Securing the Business Processes
21:54
21:54
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
21:54
G Mark Hardy dives deep into effective strategies for securing your business. Learn why it's essential for cybersecurity leaders to communicate the real business impact of vulnerabilities and discover the importance of identifying and prioritizing critical business processes. Gain insights from historical references and practical frameworks like th…
…
continue reading
1
7MS #641: DIY Pentest Dropbox Tips – Part 10
27:42
27:42
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
27:42
Today we’re revisiting the fun world of automating pentest dropboxes using Proxmox, Ansible, Cursor and Level. Plus, a tease about how all this talk about automation is getting us excited for a long-term project: creating a free/community edition of Light Pentest LITE training!
…
continue reading
1
Building Symmetry Systems & Thriving as an Security Entrepreneur | Mohit Tiwari | Be Fearless EP 9
46:08
46:08
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
46:08
Mohit Tiwari, co-founder and CEO of Symmetry Systems, joins Vivek and Aleksandra in this DEF CON 32 Special Episode of our podcast! Hear directly from him on his journey towards entrepreneurship, how Symmetry Systems (https://www.symmetry-systems.com) solves modern data security problems, practical advice for those wishing to start their own compan…
…
continue reading
1
#12 Why OSCP Might Not Be Worth It - A Surprising Take by Evan Isaac
37:52
37:52
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
37:52
Kyser Clark and Evan Isaac discuss their experiences and insights in cybersecurity. They cover topics such as certifications, content creation on LinkedIn, web hacking resources, job searching advice, and the importance of offensive and defensive cybersecurity skills. Connect with Evan Isaac on LinkedIn: https://www.linkedin.com/in/evan-isaac/ Take…
…
continue reading
1
Episode 107: How To Defend Against Lateral Movement
37:48
37:48
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
37:48
Text us feedback! In this episode, Spencer and Brad dive into lateral movement, discussing various techniques like RDP, RATs, Impacket tools, PsExec, PTH, PTT, and PowerShell Remoting. They explain how attackers use these methods to gain unauthorized access, evade detection, and enable malicious activities. They also discuss precursors to lateral m…
…
continue reading
1
The Future of Payments: Navigating Change Management
23:18
23:18
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
23:18
In this episode, Craig Jeffery, Managing Partner of Strategic Treasurer, and Susan Nichols, VP, B2B Payments Product and Business Management at Deluxe, explore effective change management for digital payments. They discuss balancing technology upgrades with managing internal and external changes, securing executive buy-in, and integrating digital s…
…
continue reading
1
#197 - Fedshark's Blueprint for Cost Effective Risk Reduction
46:27
46:27
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
46:27
Join host G Mark Hardy as he dives deep into the complexities of compliance and reporting, featuring special guests Brian Bradley and Josh Williams from FedShark. Discover a unique and streamlined approach to compliance using FedShark's innovative tools and AI-assisted systems. Learn about their exclusive offers for CISO Tradecraft listeners, inclu…
…
continue reading
1
Scaling Black Hat Conference to New Heights | Steve Wylie | Be Fearless Podcast EP 8
56:08
56:08
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
56:08
Get an insider’s view of how the famed Black Hat cybersecurity conference is run from Steve Wylie, General Manager of Black Hat himself! In this episode, Vivek and Aleksandra have a conversation with Steve on how Black Hat is organized, the associated challenges and highlights and the important role of entrepreneurship within the cybersecurity comm…
…
continue reading
1
Episode 412 - AI, ML & Automation | Aligning Safety & Cybersecurity - Episode 6
1:02:41
1:02:41
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
1:02:41
In March 2024, the Australian Senate resolved that the Select Committee on Adopting Artificial Intelligence (AI) be established to inquire into and report on the opportunities and impacts for Australia arising out of the uptake of AI technologies in Australia. The committee intends to report to the Parliament on or before 19 September 2024. More th…
…
continue reading
1
7MS #640: Tales of Pentest Pwnage – Part 63
43:19
43:19
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
43:19
This was my favorite pentest tale of pwnage to date! There’s a lot to cover in this episode so I’m going to try and bullet out the TLDR version here: Sprinkled farmer files around the environment Found high-priv boxes with WebClient enabled Added “ghost” machine to the Active Directory (we’ll call it GHOSTY) RBCD attack to be able to impersonate a …
…
continue reading
1
Coffee Break Session #117: What Is a Payment Security Assessment?
8:28
8:28
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
8:28
In today’s episode, we’ll hear from Craig Jeffery about payment security assessments—what they are, who conducts them, and why they are crucial for your business. Listen in to learn more.
…
continue reading
Text us feedback! In our "DNS Security" podcast, we delve into DNS's critical role in how the internet works, exploring its vulnerabilities and attacks like DNS spoofing, cache poisoning, and DDoS. We discuss DNSSEC and its components, including public and private keys, and examine practical solutions such as DNS and content filtering. The episode …
…
continue reading