A "by Hackers for Hackers" podcast focused on technical content ranging from bug bounty tips, to write-up explanations, to the latest hacking techniques.
…
continue reading
Bug Bounty Podcasts
The show that decrypts the secrets of offensive cybersecurity, one byte at a time. Every week I invite you into the world of ethical hacking by interviewing leading offensive security practitioners. If you are a penetration tester, bug bounty hunter, red teamer, or blue teamer who wants to better understand the modern hacker mindset, whether you are new or experienced, this show is for you.
…
continue reading
A Podcast about bugs, bounties and its researchers. Hosted by Fisher.
…
continue reading
Welcome to the Bug Hunter Podcast by Pentesterland, a podcast for pentesters & bug bounty hunters. We tackle technical questions & inspirational topics to help you develop both a hacker skillset & mindset.
…
continue reading
Behind The Bounty gives you an inside look at the community and people that make bug bounties happen. Hosted by Ben Sadeghipour (NahamSec) and Nathanial Lattimer (d0nut).
…
continue reading
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, develop ...
…
continue reading
The Cyber Riddler is a podcast that discusses interesting topics in the field of information security. It explores different areas and situations in real-life cyber security engagements and activities. Episodes feature guests from different backgrounds such as hackers, security analysts, cyber security managers, bug bounty hobbyists and more.
…
continue reading
Welcome to "Crying Out Cloud," the monthly podcast that keeps you up to date with the latest cloud security news. Hosted by experts Eden Naftali and Amitai Cohen, each episode provides in-depth coverage of the most important vulnerabilities and incidents from the previous month. Tune in for insightful analysis and expert recommendations to help you safeguard your cloud infrastructure.
…
continue reading
A weekly podcast of all things application security related. Hosted by Ken Johnson and Seth Law.
…
continue reading
Hack for Fun and Profit is a weekly podcast for anyone who is interested in ethical hacking. The topics include bug bounty hunting, penetration testing, red teaming and many more. Sit back and enjoy stories, tips and tricks that will inspire you. For subscription-only episodes, enroll using this link: https://anchor.fm/thehackerish/subscribe
…
continue reading
Future Secured brings you in-depth conversations with Australian and global cyber security leaders, founders, CEOs, and co-founders. Hosted by Jason Murell and Tom Finnigan, each episode delves into the personal journeys of these experts as they navigate the challenges of building and scaling successful cyber security businesses. From critical industry issues to hard-learned lessons, the podcast explores the competitive global market and offers valuable insights on how to start, grow, and su ...
…
continue reading
Welcome to eCommerceAholic, where we help you get more from your eCommerce store.
…
continue reading
A podcast about the makers and breakers shaping cybersecurity. New episodes every other Monday! Go to https://hackerculture.fm for more information!
…
continue reading
Get in-depth coverage of current and future trends in technology, and how they are shaping business, entertainment, communications, science, politics, and society.
…
continue reading
Hacker Talk brings you interesting conversation between some of the world best hackers, cyber security professionals and information security people.
…
continue reading
In "Surfacing Security," we explore a variety of cybersecurity topics relevant to Attack Surface Management and beyond. Your co-hosts are Michael Gianarakis (Assetnote Co-Founder/CEO) and Shubham Shah (Assetnote Co-Founder/CTO).
…
continue reading
The Business Security (BizSec) Podcast. Hosts Beau Woods and Dave Kennedy analyze and discuss the latest business news in the information and technology security world, as well as a bigger picture theme each episode. Follow us @bizsecpodcast
…
continue reading
STEM brother Basir Vincent podcast sharing small connect with the Tech bytes to encourage thought about STEM and STEAM engagement. Cover art photo provided by Oliver Pecker on Unsplash: https://unsplash.com/@ollipexxer
…
continue reading
Building better software, one incident at a time. Host Kevin Riggle talks with software engineers about that time they broke production. Whether you're an industry professional, or just curious about what makes the modern Internet run and what happens when it breaks, we bring you stories you haven't heard elsewhere. This is the audio version of the podcast. Watch on YouTube: https://youtube.com/@critical-point Produced by Complex Systems Group (https://complexsystems.group). Part of Critical ...
…
continue reading
Join us as we watch and discuss the entire Star Wars Canon from The Phantom Menace to the Force Awakens and beyond! Co-hosts Mondo, Joe (both from Not the Show) and with Ty (from Geek Fight Club's Chaos Inc.) talk about what they love and hate about The Saga.
…
continue reading
An insanely enjoyable Bitcoin podcast with a strong focus on liberty. Every Thursday, we chat about how Bitcoin sets the world free and share the latest cryptocurrency news and general Bitcoin talk. Guests have included: - Mastering Bitcoin author Andreas Antonopoulos - Liberty.me CLO Jeffrey Tucker - Antiwar.com editor Angela Keaton - Bitcoin/liberty activist Michele Seven - Jason King from Sean's Outpost Homeless Outreach - Drew Phillips from Bitcoin Not Bombs - Numerous other Bitcoin-lovi ...
…
continue reading

1
Episode 132: Archive Testing Methodology with Mathias Karlsson
1:49:32
1:49:32
Play later
Play later
Lists
Like
Liked
1:49:32Episode 132: In this episode of Critical Thinking - Bug Bounty Podcast, Justin Gardner is joined by Mathias Karlsson to discuss vulnerabilities associated with archives. They talk about his new tool, Archive Alchemist, and explore topics like the significance of Unicode paths, symlinks, and TAR before they end up talking about Charsets again.. Foll…
…
continue reading
Seth and Ken are _back_ to talk through some recent experiences and news across the industry. To start the episode, Seth highlights the edge cases uncovered during manual code review that require context to understand and identify. Inspired by recent a recent post on AI Slop in the curl bug bounty program, the duo addresses the increase of slop acr…
…
continue reading

1
Ep. 11 – Account Takeover, Token Misuse, and Deserialization RCE: When Trust Goes Wrong
17:15
17:15
Play later
Play later
Lists
Like
Liked
17:15One flawed password reset. One shared session token. One dangerous object. In Episode 11 of Hacked & Secured: Pentest Exploits & Mitigations, we break down three real-world vulnerabilities where trust between systems and users broke down—with serious consequences. Account Takeover via Forgot Password – A predictable ID and exposed tokens let attack…
…
continue reading

1
From Marine to Cyber - Future Secured Episode 42
46:43
46:43
Play later
Play later
Lists
Like
Liked
46:43Guest: Will Baxter, Field CISO at Team Cymru Hosts: Tom Finnigan & Jason Murrell In this episode of Future Secured, we sit down with Will Baxter, a cyber veteran who began his career in the US Marine Corps and now serves as Field CISO for Team Cymru, a leading global threat intelligence firm. From defending military networks to helping some of the …
…
continue reading

1
#53 The Dark Side of Influence: When Winning Feels Like Losing ft. Alethe Denis
39:24
39:24
Play later
Play later
Lists
Like
Liked
39:24In this episode of The Hacker’s Cache, Kyser Clark interviews legendary social engineer Alethe Denis to explore the ethical limits of influence in red team engagements. From her DEF CON Black Badge victory to her groundbreaking work at Bishop Fox, Alethe shares hard-earned insights on emotional manipulation, deepfakes, social engineering strategy, …
…
continue reading

1
Episode 131: SL Cyber Writeups, Bug Bounty Metastrategy, and Orphaned Github Commits
50:36
50:36
Play later
Play later
Lists
Like
Liked
50:36Episode 131: In this episode of Critical Thinking - Bug Bounty Podcast we're covering Christmas in July with several banger articles from Searchlight Cyber, as well as covering things like Raycast for Windows, Third-Person prompting, and touch on the recent McDonalds Leak Follow us on twitter at: https://x.com/ctbbpodcast Got any ideas and suggesti…
…
continue reading

1
Live Talk: Security Minds from Riot Games, Microsoft & Wiz
39:35
39:35
Play later
Play later
Lists
Like
Liked
39:35- 💡 From cloud chaos to career confessions: live with security minds from RiotGames & Microsoft.Eden Naftali went live, and got personal, with 3 leaders shaping the future of cloud and cybersecurity:- Nicole Dove, Head of Security Engineering at @Riot Games- Sherrod DeGrippo, Director of Threat Intelligence Strategy at Microsoft- Alon Schindel, VP …
…
continue reading

1
Episode 130: Minecraft Hacks to Google Hacking Star - Valentino
1:08:26
1:08:26
Play later
Play later
Lists
Like
Liked
1:08:26Episode 130: In this episode of Critical Thinking - Bug Bounty Podcast Justin is joined by Valentino, who shares his journey from hacking Minecraft to becoming a Google hunter. He talks us through several bugs, including an HTML Sanitizer bypass and .NET deserialization, and highlights the hyper creative approaches he tends to employ. Follow us on …
…
continue reading

1
AI Double Agents to Blame, Scattered Spider Pivots to Planes
17:40
17:40
Play later
Play later
Lists
Like
Liked
17:40🎙️ Scattered Spider's new target? Airlines.Eden Koby Naftali & Amitai Cohen break down the latest in the cloud:1️⃣ A connectivity tool vuln & Open WebUI misconfig putting orgs at risk2️⃣ Why attackers are still tricking help desks (and how!)3️⃣ The "lethal trifecta" of AI agent danger, explained 🧠🤖0:25 – Scattered Spider targets the aviation indust…
…
continue reading
Sean Varga, current regional sales manager with noted ASPM company Cycode joins Ken (@cktricky) and Seth (@sethlaw) to discuss the dawning realization organizations are having that they need AppSec experience and tech help to accompany their swelling numbers of developers. Sean's introduces "the OWASP Top 10 for AppSec Sales" to the community Befor…
…
continue reading

1
Episode 129: Is this how Bug Bounty Ends?
36:14
36:14
Play later
Play later
Lists
Like
Liked
36:14Episode 129: In this episode of Critical Thinking - Bug Bounty Podcast we chat about the future of hack bots and human-AI collaboration, the challenges posed by tokenization, and the need for cybersecurity professionals to adapt to the evolving landscape of hacking in the age of AI Follow us on twitter at: https://x.com/ctbbpodcast Got any ideas an…
…
continue reading

1
#52 The Ultimate Hacking Wisdom Compilation
26:43
26:43
Play later
Play later
Lists
Like
Liked
26:43This episode marks one year of The Hacker’s Cache. To celebrate, I’ve compiled the most powerful, insightful, and thought-provoking moments from every single episode of Season 1, all 52 of them, in one back-to-back highlight reel. This isn’t just a recap. It’s a front-row seat to the best hot takes, bold opinions, unique insights, and raw truths fr…
…
continue reading
Ken returns after a week's hiatus to review the latest AppSec news with Seth. Specifically, the idea that authentication fatigue exists for both consumers and developers. The amount of choice to implement security controls can have unintended consequences and introduces risk that may or may not be considered. This is followed by research from Squar…
…
continue reading

1
#51 Q&A: Why YouTube Took Down My Wi-Fi Hacking Video
27:29
27:29
Play later
Play later
Lists
Like
Liked
27:29In this Q&A episode of The Hacker’s Cache, I answer your top questions about breaking into cybersecurity from a software engineering background, whether an associate's degree is worth pursuing, and how I prepare for CompTIA certifications using third-party resources. I also open up about why YouTube took down one of my most popular Wi-Fi hacking vi…
…
continue reading

1
Ep. 10 – Cookie XSS & Image Upload RCE: One Cookie, One File, Full Control
20:12
20:12
Play later
Play later
Lists
Like
Liked
20:12One cookie set on a subdomain triggered XSS and stole session tokens. One fake image upload gave the attacker a reverse shell. This episode breaks down two powerful exploits—a cookie-based XSS that bypassed frontend protections, and an RCE through Ghostscript triggered by a disguised PostScript file. Learn how subtle misconfigurations turned everyd…
…
continue reading

1
Episode 128: New Research in Blind SSRF and Self-XSS, and How to Architect Source-code Review AI Bots
58:06
58:06
Play later
Play later
Lists
Like
Liked
58:06Episode 128: In this episode of Critical Thinking - Bug Bounty Podcast we talking Blind SSRF and Self-XSS, as well as Reversing massive minified JS with AI and a wild Google Logo Ligature Bug Follow us on twitter at: https://x.com/ctbbpodcast Got any ideas and suggestions? Feel free to send us any feedback here: [email protected] Shou…
…
continue reading

1
Pyramid of Pain, PEAK, and Bagpipes with David Bianco
27:29
27:29
Play later
Play later
Lists
Like
Liked
27:29🎙️ New ep: David Bianco from Splunk with 🔥 insights from a lifetime of threat hunting.Eden Koby Naftali & Amitai Cohen sat down with David Bianco, creator of some of the most influential models in cyber detection.What they got into ⬇️1) How a threat intel milestone led to the Pyramid of Pain2) Why detection isn't just about indicators3) What good t…
…
continue reading
With @cktricky out on a grand tour across the country (or just unable to record for the day), @sethlaw succumbs to the dark side to give @lojikil a platform to talk about recent developments in the application security world. Specifically, a discussion on vulnerability data and scoring mechanisms, including CVE, CVSS, CWSS, and other acronyms. Wrap…
…
continue reading

1
The Role of University, Bitcoin, AI & Cybersecurity - Future Secured EP 41
49:45
49:45
Play later
Play later
Lists
Like
Liked
49:45How do you protect a global research institution while embracing bleeding-edge tech like supercomputers, AI and even Bitcoin? Dan Maslin, Group CISO at Monash University, returns to Future Secured to unpack what’s changed in cybersecurity across higher education and why universities are fast becoming some of the most complex security environments i…
…
continue reading

1
#50 No OSCP. No Degree. Still Landed a Red Team Job ft. Richie Vinson (4NU81X7H3H4CK3r)
39:24
39:24
Play later
Play later
Lists
Like
Liked
39:24In this episode, Richie Vinson (4NU81X7H3H4CK3r) shares how he broke into red teaming without a college degree or the OSCP certification. He explains why he skipped traditional credentials, how volunteering at cybersecurity conferences helped him bypass the HR firewall, and what newcomers can do to stand out. From earning a Black Badge at HackSpace…
…
continue reading

1
Episode 127: Drama, PDF as JS Chaos, Bounty Profile Apps, And More
1:07:25
1:07:25
Play later
Play later
Lists
Like
Liked
1:07:25Episode 127: In this episode of Critical Thinking - Bug Bounty Podcast we address some recent bug bounty controversy before jumping into a slew of news items Follow us on X Shoutout to YTCracker for the awesome intro music! Today's Sponsor: Adobe ====== This Week In Bug Bounty ====== Hackers Guide to Google dorking YesWeCaido New Dojo Challenge Sma…
…
continue reading
Seth and Ken return with an in-depth discussion around the future of security due to use of AI. The landscape of security is changing quickly and we do not know where it is headed. As such, it is worth exploring how it has changed security's outlook and what we are seeing across organizations from a consulting and product perspective. A recent arti…
…
continue reading

1
Episode 126: Hacking AI Series: Vulnus ex Machina - Part 3
38:32
38:32
Play later
Play later
Lists
Like
Liked
38:32Episode 126: In this episode of Critical Thinking - Bug Bounty Podcast we wrap up Rez0’s AI miniseries ‘Vulnus Ex Machina’. Part 3 includes a showcase of AI Vulns that Rez0 himself has found, and how much they paid out. Follow us on twitter at: https://x.com/ctbbpodcast Got any ideas and suggestions? Feel free to send us any feedback here: info@cri…
…
continue reading

1
#49 He Found Vulnerabilities in His Own Code: Then Made a Career Out of It ft. John Kounelis
41:06
41:06
Play later
Play later
Lists
Like
Liked
41:06In this episode of The Hacker’s Cache, Kyser Clark interviews John Kounelis, a Senior Product Security Engineer with a background in software development and AppSec. John shares how discovering vulnerabilities in his own code led him to a full-time role in application security, and explains the key differences in AppSec across defense, biotech, and…
…
continue reading
Hayden Smith, Hunted Labs Co-Founder comes on Absolute AppSec to discuss, among other things, the Hunted Labs work discovering and publicizing the EasyJson software supply chain threat. Before co-founding Hunted Labs, Hayden was Senior Director of Field Services at Anchore, assisting US government, intelligence, and Fortune 500 clients. Long a spec…
…
continue reading

1
Cyber Mining With Lego - Future Secured Ep 40
46:50
46:50
Play later
Play later
Lists
Like
Liked
46:50In this episode, Vannessa Van Beek, Global CISO at Fortescue, joins Tom Finnigan and Jason Murrell to unpack what it takes to lead cyber security at the intersection of AI, mining, and innovation at scale. She shares her unconventional journey to becoming CISO, her early adoption of AI inside security operations, and how Fortescue is using emerging…
…
continue reading

1
Episode 125: How to Win Live Hacking Events
47:04
47:04
Play later
Play later
Lists
Like
Liked
47:04Episode 125: In this episode of Critical Thinking - Bug Bounty Podcast Justin shares insights on how to succeed at live hacking events. We cover pre-event preparations, challenges of collaboration, on-site strategies, and the importance of maintaining a healthy mindset throughout the entire process. Follow us on twitter at: https://x.com/ctbbpodcas…
…
continue reading

1
#48 He Got Hired Without Knowing the Answer: Here’s Why ft. Michael Kim
38:28
38:28
Play later
Play later
Lists
Like
Liked
38:28In this episode of The Hacker’s Cache, senior offensive security consultant Michael Kim shares how he landed a cybersecurity job without knowing all the answers in the interview and why hiring managers still chose him. We discuss how to ace your cybersecurity interview, the importance of mindset and growth, and why technical skills alone aren’t eno…
…
continue reading

1
Time To Take Your Cyber Medicine - Future Secured Ep 39
41:57
41:57
Play later
Play later
Lists
Like
Liked
41:57What happens when your cybersecurity team is running during a natural disaster, with no power, no cooling, and 40°C outside? In this episode, Nigel Hedges, GM – Cyber & Risk at Chemist Warehouse, joins Tom Finnigan and Jason Murrell to talk about what cyber security really looks like inside a major retail environment. With a career shaped by enterp…
…
continue reading

1
Ep. 9 – Directory Traversal & LFI: From File Leaks to Full Server Crash
25:05
25:05
Play later
Play later
Lists
Like
Liked
25:05One markdown link copied server files. One poisoned log triggered remote code execution. One LFI crashed the entire server. In this episode, we unpack three real-world exploits—directory traversal and local file inclusion flaws that went far beyond file reads. From silent data leaks to full server compromise, these attacks all started with a single…
…
continue reading

1
AI-powered Security, Shared Fate, and an Archery Lesson with Dr. Anton Chuvakin
25:39
25:39
Play later
Play later
Lists
Like
Liked
25:39🎙️ Just dropped: Dr. Anton Chuvakin from Google Cloud, with legendary insights (and cloud security jokes).Eden Koby Naftali & Amitai Cohen sat down with Dr. Anton Chuvakin, Google Cloud's Office of the CISO, and the guy who made SIEM cool!What they got into ⬇️ 1) Why SOCs are broken (and full of toil)2) How to actually apply AI in security3) Why cl…
…
continue reading

1
Episode 124: Bug Bounty Lifestyle = Less Hacking Time?
45:26
45:26
Play later
Play later
Lists
Like
Liked
45:26Episode 124: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joseph cover some news from around the community, hitting on Joseph’s Anthropic safety testing, Justin’s guest appearance on For Crying Out Cloud, and several fascinating tweets. Then they have a quick Full-time Bug Bounty check-in. Follow us on twitter at: https://x.…
…
continue reading

1
Verizon Warning - The Real State of Cyber Security. Future Secured Ep 38
48:51
48:51
Play later
Play later
Lists
Like
Liked
48:51What do C-suites misunderstand most about cyber security? Robert Le Busque, Regional VP for Asia Pacific at Verizon Business Group, joins Tom Finnigan and Jason Murrell to talk about the real state of cyber readiness and the costly gaps most leaders don’t see until it’s too late. From his background in classical music to running cyber simulations w…
…
continue reading

1
#47 Q&A: Feel Lost Watching Hacking Videos? Listen to This
32:00
32:00
Play later
Play later
Lists
Like
Liked
32:00Feeling overwhelmed watching hacking videos and not understanding what’s going on? You’re not alone, and you’re not behind. In this episode of The Hacker’s Cache, I answer real questions from the community about certifications, career paths, and that all-too-familiar. I share my own experience struggling with concepts early on, why I prefer the bab…
…
continue reading

1
Episode 123: Hacking AI Series: Vulnus ex Machina - Part 2
44:12
44:12
Play later
Play later
Lists
Like
Liked
44:12Episode 123: In this episode of Critical Thinking - Bug Bounty Podcast we’re back with part 2 of Rez0’s miniseries. Today we talk about mastering Prompt Injection, taxonomy of impact, and both triggering traditional Vulns and exploiting AI-specific features. Follow us on twitter at: https://x.com/ctbbpodcast Got any ideas and suggestions? Feel free…
…
continue reading

1
This Isn’t a Front Door. It’s a Vault Cloud - Future Secured Episode 36
42:31
42:31
Play later
Play later
Lists
Like
Liked
42:31In this episode, Tom Finnigan and Jason Murrell sit down with Rupert Taylor-Price, CEO of Vault Cloud, to dive into what it takes to build sovereign cloud infrastructure that doesn’t just host data, it protects national secrets. Rupert shares his journey from developer to hyperscale cloud builder, the decision to own source code, and why Vault refu…
…
continue reading

1
Never Go Full Cyber - Future Secured Episode 37
40:09
40:09
Play later
Play later
Lists
Like
Liked
40:09Why Basics Beat Buzzwords with Edward Farrell In this episode of Future Secured, Tom Finnigan and Jason Murrell sit down with Edward Farrell, CEO of Mercury Information Security Services, to talk about why cyber security has lost its way—and what it will take to fix it. Known for his no-nonsense perspective, Edward argues that the industry is obses…
…
continue reading

1
Bug Bounties, The Wanted Poster For Ethical Hackers - Future Secured Episode 35
51:30
51:30
Play later
Play later
Lists
Like
Liked
51:30In this episode, Casey Ellis, founder of Bugcrowd and a pioneer of the crowdsourced cyber security movement, shares the hard-earned lessons from building a category-defining company. Casey pulls back the curtain on the real startup grind: from bootstrapping Bugcrowd into a global force to navigating leadership pressures, health crises and building …
…
continue reading
We are happy to have Kayra Otaner as a special guest on the Absolute AppSec podcast. Kayra (kayraotaner on LinkedIn and X/twitter), the current Director of DevSecOps at Roche, brings over 15 years of cybersecurity leadership experience from New York and Wall Street. He's led DevSecOps and DevOps teams across a variety of organizations, including AD…
…
continue reading

1
Episode 122: We Won Google's AI Hacking Event in Tokyo - Main Takeaways
1:45:30
1:45:30
Play later
Play later
Lists
Like
Liked
1:45:30Episode 122: In this episode of Critical Thinking - Bug Bounty Podcast your boys are MVH winners! First we’re joined by Zak, to discuss the Google LHE as well as surprising us with a bug of his own! Then, we sit down with Lupin and Monke for a winners roundtable and retrospective of the event. Follow us on twitter at: https://x.com/ctbbpodcast Got …
…
continue reading

1
UK Retail Breaches, SAP 0day, and CVE Troubles
29:05
29:05
Play later
Play later
Lists
Like
Liked
29:05🎙️ All you need to know from Ransomware to CVE Programs!☁️ Join Amitai Cohen and Eden Naftali as they break down the top stories in the cloud:- UK Retail Sector Hit by Ransomware (DragonForce & Scattered Spider)- SAP NetWeaver Vulnerability Exploited in the Wild- CVE Program Faces Major Backlog and Trust Issues…
…
continue reading

1
#46 She Started Coding at 13 and Never Looked Back ft. Betta Lyon Delsordo
39:49
39:49
Play later
Play later
Lists
Like
Liked
39:49Betta Lyon Delsordo started coding at just 13 years old and never looked back. In this episode, she shares how learning to code as a rebellious teen sparked a career that led her from freelance web development to becoming a lead application pentester specializing in web, cloud, and AI hacking. We talk about how anyone can learn to code, the importa…
…
continue reading
News this week has been dominated by dependency issues and attribution towards unwanted nation states and actors. Specifically, easyjson is developed by a Russian firm that is under sanctions. The podcast duo discuss the implications and how to protect apps from sub-dependency threats. This leads to a deep dive into breaches and whether a breach ha…
…
continue reading

1
Bug Bounty Secrets, Hacker Communities, and a Hit of Volleyball with Justin Gardner
40:24
40:24
Play later
Play later
Lists
Like
Liked
40:24🎙️ Listen to the biggest insights of bug bounty hunting with Justin Gardner 🚨 In this episode, Amitai Cohen and Eden Naftali are joined by none other than Justin, renowned bug bounty hunter and host of the Creative Thinking podcast (ctbbpodcast). Justin unpacks some of today's 🔥 topics: - Bug bounty disclosure challenges & trends - Security stories…
…
continue reading

1
Episode 121: Slonser’s Image Injection 0-day -> ATO & New Caido Collab Plugin
57:27
57:27
Play later
Play later
Lists
Like
Liked
57:27Episode 121: In this episode of Critical Thinking - Bug Bounty Podcast we cover so much news and research that we ran out of room in the description... Follow us on X Shoutout to YTCracker for the awesome intro music! ====== Links ====== Follow Rhynorater and Rez0 on X: ====== Ways to Support CTBBPodcast ====== Hop on the CTBB Discord! We also have…
…
continue reading

1
#45 OSWA Grind: 24 Hours. No Sleep. One Last Flag ft. Pratham Shah
35:16
35:16
Play later
Play later
Lists
Like
Liked
35:16He stayed up for 24 hours straight to pass one of OffSec’s toughest exams. In this episode of The Hacker’s Cache, I sit down with Pratham Shah, a 21-year-old cybersecurity consultant who holds OSCE3, OSCP+, OSWA, and more. We break down his insane study grind, how OSWA pushed him harder than OSCP, and why he thinks passion matters more than paychec…
…
continue reading
Back after a hiatus for both BSidesSF and RSA, Seth and Ken recap their experience at both conferences. TL;DR - BSidesSF is great for technical security content and community, RSA focuses on sales for mostly large organizations and budgets. Two sides of the security industry coin and depends on preferences for which makes the most sense for career …
…
continue reading

1
Episode 120: SpaceRaccoon - From Day Zero to Zero Day
1:36:57
1:36:57
Play later
Play later
Lists
Like
Liked
1:36:57Episode 120: In this episode of Critical Thinking - Bug Bounty Podcast Justin Gardner welcomes Eugene to talk (aka fanboy) about his new book, 'From Day Zero to Zero Day.' We walk through what to expect in each chapter, including Binary Analysis, Source and Sink Discovery, and Fuzzing everything.Then we give listeners a special deal on the book. Fo…
…
continue reading

1
#44 How to Hack What No One Teaches ft. Noah Pack
33:17
33:17
Play later
Play later
Lists
Like
Liked
33:17In this episode of The Hacker’s Cache, I sit down with Noah Pack, an aerospace pentester with a ridiculous cert stack and an unconventional mindset. We talk about hacking obscure systems with no public tools or documentation, transitioning from SOC analyst to pentester, and why reading the manual might be your secret weapon. If you’ve ever wondered…
…
continue reading

1
Ep. 8 – OTP Flaw & Remote Code Execution: When Small Flaws Go Critical
15:45
15:45
Play later
Play later
Lists
Like
Liked
15:45A broken logout flow let attackers hijack accounts using just a user ID. A self-XSS and an IDOR exposed stored data. And a forgotten internal tool—running outdated software—ended in full Remote Code Execution. This episode is all about how small bugs, missed checks, and overlooked services can lead to serious consequences. Chapters: 00:00 - INTRO 0…
…
continue reading