Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics. [email protected]
…
continue reading
Pentest Podcasts
The show that decrypts the secrets of offensive cybersecurity, one byte at a time. Every week I invite you into the world of ethical hacking by interviewing leading offensive security practitioners. If you are a penetration tester, bug bounty hunter, red teamer, or blue teamer who wants to better understand the modern hacker mindset, whether you are new or experienced, this show is for you.
…
continue reading
Barcode is a cocktail powered podcast that dives into the technology, personalities, criminals, and heroes that have come to define modern security across the globe. Hosted by Chris Glanden.
…
continue reading
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
…
continue reading
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, develop ...
…
continue reading
We think we know how computer systems work, but how come they keep surprising us? We also think we know how humans behave, but we keep finding out we don’t. This podcast is for ethical hackers who are thirsty for challenges and who never settle for easy answers. We challenge some of the best offensive security pros in the world to reveal the unique traits, skills, and real-world experiences that got them where they are today. Get ready to be caught off guard as we debunk misconceptions, diss ...
…
continue reading
Bite-sized education for a big-impact world. As the smaller, approachable sibling to the long-form and complex Bare Metal Cyber podcast, Dot Ones are perfect for quick learning moments that build on the larger journey of understanding. Each episode dives into essential topics, breaking down complex ideas into targeted and straightforward lessons—all in under 15 minutes. Whether you're just starting or brushing up, Dot Ones offers practical knowledge in an accessible format, making learning q ...
…
continue reading
Phillip Wylie interviews cybersecurity industry experts on offensive security and techniques around penetration testing and red teaming.
…
continue reading
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
…
continue reading
Welcome to The MLSecOps Podcast, presented by Protect AI. Here we explore the world of machine learning security operations, a.k.a., MLSecOps. From preventing attacks to navigating new AI regulations, we'll dive into the latest developments, strategies, and best practices with industry leaders and AI experts. Sit back, relax, and learn something new with us today. Learn more and get involved with the MLSecOps Community at https://bit.ly/MLSecOps.
…
continue reading
Join an all-star cast — including Dan DeCloss and Shawn Scott from PlexTrac, Paul Asadoorian and Tyler Robinson from Security Weekly, and Bryson Bort from SCYTHE — for a podcast mini-series focused on getting the real work done in cybersecurity. These four episodes will consider the perspectives of red, blue, and purple teamers alike in tracking signal through the noise to identify and prioritize the right things. Additionally, we’ll show off how PlexTrac empowers all types of security pros ...
…
continue reading
Join an all-star cast — including Dan DeCloss and Shawn Scott from PlexTrac, Paul Asadoorian and Tyler Robinson from Security Weekly, and Bryson Bort from SCYTHE — for a podcast mini-series focused on getting the real work done in cybersecurity. These four episodes will consider the perspectives of red, blue, and purple teamers alike in tracking signal through the noise to identify and prioritize the right things. Additionally, we’ll show off how PlexTrac empowers all types of security pros ...
…
continue reading
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
I started out wrapping burritos at Chipotle, dreaming of something bigger but not quite sure where to go. Over time, that drive to learn and grow led me into cybersecurity—an industry where the stakes are high and the stories are endlessly fascinating. K.O.’s Launchpad is my way of opening the door for anyone curious about how to break in, level up, and find purpose in a field that’s shaping our digital future. In every episode, we’ll chat with experts, share practical strategies, and explor ...
…
continue reading
Cybersecurity career, technology, and success tips.
…
continue reading
Your anything goes security podcast presented to you by Black Lantern Security
…
continue reading
Welcome to the Bug Hunter Podcast by Pentesterland, a podcast for pentesters & bug bounty hunters. We tackle technical questions & inspirational topics to help you develop both a hacker skillset & mindset.
…
continue reading
A new independent Podcast focusing on all things IT Security, although with a SOC focus. From Incident Response, Pen Testing, Ransomware and Digital Forensics, through to hiring, certification and recruitment. Enjoy a mix of up-to-date commentary and guest interviews with a few laughs and stories along the way.
…
continue reading
Technology tips and insights to help protect your business! We offer weekly interviews with industry experts and leaders from companies like Coca-Cola, Verizon and AT&T to share their insights on cybersecurity and other technology topics. Join your host, Shaun St.Hill, the CEO of Tech and Main!
…
continue reading
It takes a lot to solve complex data problems securely. A sandbox is the perfect space to discover new approaches. In season two of Security Sandbox, Relativity CSO & CIO Amanda Fennell chats with guests about maximizing security's greatest asset—people—through meaningful use of technology and process, creative and compassionate training, and the conviction that there is room for taking risk in security.
…
continue reading
A podcast that explores the stories of real people, their work, and its impact on the information security industry. Join security expert Caroline Wong as she focuses on the human side of security. Don't forget to follow the podcast on Twitter: https://twitter.com/humansofinfosec
…
continue reading
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
…
continue reading
This Cyber Security podcast is intended to help people better protect themselves from Cyber criminals by offering quick tips, hacking news summaries and interviews with industry professionals. USB our Guest is the cyber security podcast you have been looking for. Offering quick tips and attack overviews 5-10 minutes in length intended to help people better protect themselves from Cyber criminals and 1-2hr interviews with industry professionals. From 2FA to Zero-Days and everything in between ...
…
continue reading

1
Ep. 11 – Account Takeover, Token Misuse, and Deserialization RCE: When Trust Goes Wrong
17:15
17:15
Play later
Play later
Lists
Like
Liked
17:15One flawed password reset. One shared session token. One dangerous object. In Episode 11 of Hacked & Secured: Pentest Exploits & Mitigations, we break down three real-world vulnerabilities where trust between systems and users broke down—with serious consequences. Account Takeover via Forgot Password – A predictable ID and exposed tokens let attack…
…
continue reading

1
Red Teaming vs. Pentesting, Certs That Matter, and Breaking In Without Coding with Ben Thal
37:19
37:19
Play later
Play later
Lists
Like
Liked
37:19In this episode of Simply Offensive, host Phillip Wylie welcomes offensive security veteran Ben Thal for a deep dive into the world of red teaming, penetration testing, and breaking into offensive security. With over a decade of experience across red teaming, pen testing, and hardware hacking, Ben brings practical insights for anyone interested in …
…
continue reading

1
From Pro Wrestler to Pentester: Phillip Wylie’s Wild Path
1:12:53
1:12:53
Play later
Play later
Lists
Like
Liked
1:12:53In this episode of K.O.'s Launchpad, we share an amazing journey of curiosity, dedication, and mastery. The highlight of this week's episode is Phillip Wylie, a respected offensive security professional and ethical hacker with over 21 years in cybersecurity. From system administrator to pentester, conference speaker, author, and educator, Phillip s…
…
continue reading

1
Working in ransomware response, investigation and recovery | John Price
35:58
35:58
Play later
Play later
Lists
Like
Liked
35:58Get your FREE Cybersecurity Salary Guide: https://www.infosecinstitute.com/form/cybersecurity-salary-guide-podcast/?utm_source=youtube&utm_medium=podcast&utm_campaign=podcast John Price of SubRosa joins today's Cyber Work Podcast to share insights from his unique career path spanning UK military counterintelligence, banking cybersecurity and foundi…
…
continue reading

1
#54 Offensive Security for Blue Teamers: Why Red Team Knowledge Changes Everything ft. Joshua Ragland
37:51
37:51
Play later
Play later
Lists
Like
Liked
37:51In this episode of The Hacker’s Cache, returning guest Josh Ragland shares how offensive security skills give blue teamers a serious edge. From building a hash-cracking rig to diving deep into C programming and assembly, Josh explains how understanding the attacker’s mindset can drastically cut triage time and help defenders spot threats others mis…
…
continue reading

1
7MS #685: The Time My Neighbor Almost Got Scammed Out of $13K
22:56
22:56
Play later
Play later
Lists
Like
Liked
22:56Today’s kind of a “story time with your friend Brian” episode: a tale of how my neighbor almost got scammed out of $13k. The story has a lot of red flags we can all keep in mind to keep ourselves (as well as kids/friends/parents/etc.) safer from these types of shenanigans.
…
continue reading

1
Episode 142: How Active Directory Certificates Become Active Threats
35:56
35:56
Play later
Play later
Lists
Like
Liked
35:56In this episode, we're diving into one of the most overlooked yet dangerous components of Active Directory: Certificate Services. What was designed to build trust and secure authentication is now being exploited by attackers to silently escalate privileges and persist in your environment. We’ll break down how AD CS works, how it gets abused, and wh…
…
continue reading

1
Driving Security at Scale: Dave Abbott’s Path to Cyber Leadership
1:30:29
1:30:29
Play later
Play later
Lists
Like
Liked
1:30:29In this episode of K.O.'s Launchpad, we feature an inspiring journey of technical mastery, strategic thinking, and continuous growth. The highlight of this week's episode is Dave Abbott, a Cisco Security Engineering Leader who covers the company’s largest cybersecurity partners. Dave’s work at the intersection of cloud and networking security has l…
…
continue reading

1
Community, Burnout, and Leveling Up in Offensive Security with Joe Brinkley
47:01
47:01
Play later
Play later
Lists
Like
Liked
47:01In this powerful and heartfelt episode of Simply Offensive, Phillip Wylie is joined by Joe Brinkley, better known as The Blind Hacker, Founder of the DeadPixelSec community and a seasoned offensive security professional. Joe shares his journey from sysadmin to red teamer, his philosophy on mentorship, and candid insights on burnout in cybersecurity…
…
continue reading

1
From security audits to privacy consulting: Building a GRC practice | Will Sweeney
42:20
42:20
Play later
Play later
Lists
Like
Liked
42:20Get your FREE Cybersecurity Salary Guide: https://www.infosecinstitute.com/form/cybersecurity-salary-guide-podcast/?utm_source=youtube&utm_medium=podcast&utm_campaign=podcast Will Sweeney, founding and managing partner of Zaviant, joins the Cyber Work Podcast to discuss the evolving landscape of data privacy and GRC (governance, risk and compliance…
…
continue reading

1
Season 3 Finale: Top Insights, Hacks, and Lessons from the Frontlines of AI Security
24:15
24:15
Play later
Play later
Lists
Like
Liked
24:15Send us a text To close out Season 3, we’re revisiting the standout insights, wildest vulnerabilities, and most practical lessons shared by 20+ AI practitioners, researchers, and industry leaders shaping the future of AI security. If you're building, breaking, or defending AI/ML systems, this is your must-listen roundup. Full transcript, video, and…
…
continue reading

1
#53 The Dark Side of Influence: When Winning Feels Like Losing ft. Alethe Denis
39:24
39:24
Play later
Play later
Lists
Like
Liked
39:24In this episode of The Hacker’s Cache, Kyser Clark interviews legendary social engineer Alethe Denis to explore the ethical limits of influence in red team engagements. From her DEF CON Black Badge victory to her groundbreaking work at Bishop Fox, Alethe shares hard-earned insights on emotional manipulation, deepfakes, social engineering strategy, …
…
continue reading
Hey friends, today we start pwning Ninja Hacker Academy – cool CTF-style lab that has you start with no cred and try to conquer domain admin on two domains!
…
continue reading
In this conversation, Chris Glandon interviews Josh Mason, a Solutions Architect at CINAC and founder of Newb Village. They discuss Josh's journey from being a U.S. Air Force pilot to entering the cybersecurity field, his motivation behind creating Newb Village to support newcomers in the industry, and his new book 'Speak Security with a Business A…
…
continue reading

1
Episode 141: Are You Making These Windows Security Mistakes
30:24
30:24
Play later
Play later
Lists
Like
Liked
30:24It’s easy to overlook small misconfigurations on Windows endpoints, but those little mistakes can create big opportunities for attackers. In this episode, we break down the most common Windows security missteps we see in real-world environments, from missing the basics to reused local admin passwords. If you’re a sysadmin, IT admin, or just respons…
…
continue reading

1
From Building Defenders to Commanding Cyber Labs: Ismael Valenzuela’s Journey
1:27:45
1:27:45
Play later
Play later
Lists
Like
Liked
1:27:45In this episode of K.O.'s Launchpad, we share an inspiring journey of dedication, technical excellence, and global influence. The highlight of this week's episode is Ismael Valenzuela, Vice President of Labs at Arctic Wolf and one of the world’s leading voices in cybersecurity. With over 24 years of experience, Ismael has advised governments, criti…
…
continue reading

1
Jay Beale discusses his K8s class at BlackHat, Kubernetes developments, and mental health
1:48:38
1:48:38
Play later
Play later
Lists
Like
Liked
1:48:38Youtube Video at: https://www.youtube.com/watch?v=yHPvGVfPgjI Jay Beale is a principal security consultant and CEO/CTO for InGuardians. He is the architect of multiple open source projects, including the Peirates attack tool for Kubernetes (in Kali Linux), the Bustakube CTF Kubernetes cluster, and Bastille Linux. Jay created and leads the Kubernete…
…
continue reading

1
Breaking and Securing Real-World LLM Apps
53:31
53:31
Play later
Play later
Lists
Like
Liked
53:31Send us a text Fresh off their OWASP AppSec EU talk, Rico Komenda and Javan Rasokat join Charlie McCarthy to share real-world insights on breaking and securing LLM-integrated systems. Full transcript, video, and links to episode resources available at https://mlsecops.com/podcast/breaking-and-securing-real-world-llm-apps Ask ChatGPT Thanks for chec…
…
continue reading

1
From "dead-end job" to CEO: Building an IT consulting business | John Hansman
45:40
45:40
Play later
Play later
Lists
Like
Liked
45:40Get your FREE Cybersecurity Salary Guide: https://www.infosecinstitute.com/form/cybersecurity-salary-guide-podcast/?utm_source=youtube&utm_medium=podcast&utm_campaign=podcast John Hansman of Truit joins today's Cyber Work episode to share his journey from a "dead-end job" in electronic security to building a thriving managed IT services company. As…
…
continue reading

1
7MS #683: What I'm Working on This Week - Part 4
30:50
30:50
Play later
Play later
Lists
Like
Liked
30:50This week I’m working on a mixed bag of fun security and marketing things: A pentest I’m stuck on My latest lab CTF obsession: Ninja Hacker Academy A cool “about 7MinSec” marketing video that was recorded in a pro studio!
…
continue reading

1
Episode 140: Financial Services Cybersecurity Challenges & How to Address Them - Part 2
43:33
43:33
Play later
Play later
Lists
Like
Liked
43:33In this episode, we dive into the unique cybersecurity challenges faced by the financial services sector, from high-value targets and strict compliance requirements to the constant threat of phishing and ransomware. We’ll break down common attack paths, what makes financial orgs so attractive to threat actors, and most importantly, what IT and secu…
…
continue reading

1
How Red Teamers Are Exposing Flaws in AI Pipelines
41:46
41:46
Play later
Play later
Lists
Like
Liked
41:46Send us a text Prolific bug bounty hunter and Offensive Security Lead at Toreon, Robbe Van Roey (PinkDraconian), joins the MLSecOps Podcast to break down how he discovered RCEs in BentoML and LangChain, the risks of unsafe model serialization, and his approach to red teaming AI systems. Full transcript, video, and links to episode resources availab…
…
continue reading

1
AI in Red Teaming & Communicating with Leadership with Amélie Koran
40:41
40:41
Play later
Play later
Lists
Like
Liked
40:41In this episode of Simply Offensive, Phillip Wylie interviews Amélie Koran, a seasoned expert in offensive security and AI red teaming. They discuss the evolution of red teaming, the challenges and opportunities presented by AI in security, and the importance of human expertise in navigating the complexities of cybersecurity. The conversation also …
…
continue reading

1
From Teaching to Threat Hunting: Alena Funtikova-White’s Leap into Cybersecurity
1:35:10
1:35:10
Play later
Play later
Lists
Like
Liked
1:35:10In this episode of K.O.’s Launchpad, we share an inspiring journey of transformation, dedication, and growth. The highlight of this week's episode is Alena, who transformed her career from research and teaching to defending against cyber threats at State Farm. Her path demonstrates what is possible when you commit to growth and lean into new challe…
…
continue reading

1
7MS #682: Securing Your Family During and After a Disaster – Part 7
30:59
30:59
Play later
Play later
Lists
Like
Liked
30:59Today’s episode is a downer! We talk about things you might want to have buttoned up for when you are eventually not alive anymore: Living will Buried vs. cremated? Funeral plans Funeral PHOTOS? I also talk about how my dad broke his ribs while trying to break a chimpmunk, and how a freak 4-wheeler accident also had my ribs in agony.…
…
continue reading

1
Episode 139: Financial Services Cybersecurity Challenges & How to Address Them - Part 1
41:12
41:12
Play later
Play later
Lists
Like
Liked
41:12In this episode, we dive into the unique cybersecurity challenges faced by the financial services sector, from high-value targets and strict compliance requirements to the constant threat of phishing and ransomware. Whether you're on the red team, blue team, or in leadership, this episode will help you strengthen your security posture in one of the…
…
continue reading

1
#52 The Ultimate Hacking Wisdom Compilation
26:43
26:43
Play later
Play later
Lists
Like
Liked
26:43This episode marks one year of The Hacker’s Cache. To celebrate, I’ve compiled the most powerful, insightful, and thought-provoking moments from every single episode of Season 1, all 52 of them, in one back-to-back highlight reel. This isn’t just a recap. It’s a front-row seat to the best hot takes, bold opinions, unique insights, and raw truths fr…
…
continue reading

1
Cracking The Offensive Security Career Code with Michael Kim
38:26
38:26
Play later
Play later
Lists
Like
Liked
38:26In the inaugural episode of the Simply Offensive podcast, host Phillip Wylie interviews Michael Kim, a cybersecurity professional with a diverse background. Michael shares his journey from music to cybersecurity, emphasizing the importance of networking, certifications, and continuous learning. He discusses the challenges of breaking into pen testi…
…
continue reading

1
#51 Q&A: Why YouTube Took Down My Wi-Fi Hacking Video
27:29
27:29
Play later
Play later
Lists
Like
Liked
27:29In this Q&A episode of The Hacker’s Cache, I answer your top questions about breaking into cybersecurity from a software engineering background, whether an associate's degree is worth pursuing, and how I prepare for CompTIA certifications using third-party resources. I also open up about why YouTube took down one of my most popular Wi-Fi hacking vi…
…
continue reading
Today Joe “The Machine” Skeen and I pwn the third and final realm in the world of GOAD (Game of Active Directory): essos.local! The way we go about it is to do a WinRM connection to our previously-pwned Kingslanding domain, coerce authentication out of MEEREEN (the DC for essos.local) and then capture/abuse the TGT with Rubeus! Enjoy.…
…
continue reading
In this engaging conversation, Chris Glanden interviews Kevin Johnson, a seasoned expert in IT and cybersecurity. Kevin shares his extensive journey from system administration to becoming a leader in penetration testing and ethical hacking. He emphasizes the importance of hands-on learning, the evolution of penetration testing standards, and the ro…
…
continue reading

1
(Replay) How We Evade Detection During Internal Pentests
40:44
40:44
Play later
Play later
Lists
Like
Liked
40:44(Replay) In this episode, Spencer and Brad discuss the ever popular and highly debated topic of evasion. In this podcast we talk about evasion from the context of evading defense controls, not necessarily EDR specific evasion techniques. Our hope with this episode is to shed light on this topic and help defenders understand various methods of evasi…
…
continue reading

1
Ep. 10 – Cookie XSS & Image Upload RCE: One Cookie, One File, Full Control
20:12
20:12
Play later
Play later
Lists
Like
Liked
20:12One cookie set on a subdomain triggered XSS and stole session tokens. One fake image upload gave the attacker a reverse shell. This episode breaks down two powerful exploits—a cookie-based XSS that bypassed frontend protections, and an RCE through Ghostscript triggered by a disguised PostScript file. Learn how subtle misconfigurations turned everyd…
…
continue reading

1
Securing AI for Government: Inside the Leidos + Protect AI Partnership
34:04
34:04
Play later
Play later
Lists
Like
Liked
34:04Send us a text On this episode of the MLSecOps Podcast, Rob Linger, Information Advantage Practice Lead at Leidos, join hosts Jessica Souder, Director of Government and Defense at Protect AI, and Charlie McCarthy to explore what it takes to deploy secure AI/ML systems in government environments. Full transcript, video, and links to episode resource…
…
continue reading

1
7MS #680: Tips for a Better Purple Team Experience
26:48
26:48
Play later
Play later
Lists
Like
Liked
26:48Today I share some tips on creating a better purple team experience for your customers, including: Setting up communication channels and cadence Giving a heads-up on highs/criticals during testing (not waiting until report time) Where appropriate, record videos of attacks to give them more context
…
continue reading