Barcode is a cocktail powered podcast that dives into the technology, personalities, criminals, and heroes that have come to define modern security across the globe. Hosted by Chris Glanden.
…
continue reading
The show that decrypts the secrets of offensive cybersecurity, one byte at a time. Every week I invite you into the world of ethical hacking by interviewing leading offensive security practitioners. If you are a penetration tester, bug bounty hunter, red teamer, or blue teamer who wants to better understand the modern hacker mindset, whether you are new or experienced, this show is for you.
…
continue reading
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
…
continue reading
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, develop ...
…
continue reading
Technical interviews about software topics.
…
continue reading
Bite-sized education for a big-impact world. As the smaller, approachable sibling to the long-form and complex Bare Metal Cyber podcast, Dot Ones are perfect for quick learning moments that build on the larger journey of understanding. Each episode dives into essential topics, breaking down complex ideas into targeted and straightforward lessons—all in under 15 minutes. Whether you're just starting or brushing up, Dot Ones offers practical knowledge in an accessible format, making learning q ...
…
continue reading
We think we know how computer systems work, but how come they keep surprising us? We also think we know how humans behave, but we keep finding out we don’t. This podcast is for ethical hackers who are thirsty for challenges and who never settle for easy answers. We challenge some of the best offensive security pros in the world to reveal the unique traits, skills, and real-world experiences that got them where they are today. Get ready to be caught off guard as we debunk misconceptions, diss ...
…
continue reading
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
…
continue reading
Join an all-star cast — including Dan DeCloss and Shawn Scott from PlexTrac, Paul Asadoorian and Tyler Robinson from Security Weekly, and Bryson Bort from SCYTHE — for a podcast mini-series focused on getting the real work done in cybersecurity. These four episodes will consider the perspectives of red, blue, and purple teamers alike in tracking signal through the noise to identify and prioritize the right things. Additionally, we’ll show off how PlexTrac empowers all types of security pros ...
…
continue reading
Join an all-star cast — including Dan DeCloss and Shawn Scott from PlexTrac, Paul Asadoorian and Tyler Robinson from Security Weekly, and Bryson Bort from SCYTHE — for a podcast mini-series focused on getting the real work done in cybersecurity. These four episodes will consider the perspectives of red, blue, and purple teamers alike in tracking signal through the noise to identify and prioritize the right things. Additionally, we’ll show off how PlexTrac empowers all types of security pros ...
…
continue reading
Nerding Out With Viktor is a podcast about tech, startups, and everything in between. Hosted by Viktor, a lifelong nerd and seasoned entrepreneur, the show features real conversations with builders, hackers, and technologists. Viktor got his start in Silicon Valley with YippieMove, an early email migration tool, and later created Blotter, a top-ranked productivity app for macOS. He now runs Screenly — the first developer-friendly digital signage platform — and built its open-source sibling, ...
…
continue reading
Cybersecurity career, technology, and success tips.
…
continue reading
Your anything goes security podcast presented to you by Black Lantern Security
…
continue reading
This Cyber Security podcast is intended to help people better protect themselves from Cyber criminals by offering quick tips, hacking news summaries and interviews with industry professionals. USB our Guest is the cyber security podcast you have been looking for. Offering quick tips and attack overviews 5-10 minutes in length intended to help people better protect themselves from Cyber criminals and 1-2hr interviews with industry professionals. From 2FA to Zero-Days and everything in between ...
…
continue reading
Technology tips and insights to help protect your business! We offer weekly interviews with industry experts and leaders from companies like Coca-Cola, Verizon and AT&T to share their insights on cybersecurity and other technology topics. Join your host, Shaun St.Hill, the CEO of Tech and Main!
…
continue reading
Welcome to the Bug Hunter Podcast by Pentesterland, a podcast for pentesters & bug bounty hunters. We tackle technical questions & inspirational topics to help you develop both a hacker skillset & mindset.
…
continue reading
A new independent Podcast focusing on all things IT Security, although with a SOC focus. From Incident Response, Pen Testing, Ransomware and Digital Forensics, through to hiring, certification and recruitment. Enjoy a mix of up-to-date commentary and guest interviews with a few laughs and stories along the way.
…
continue reading
It takes a lot to solve complex data problems securely. A sandbox is the perfect space to discover new approaches. In season two of Security Sandbox, Relativity CSO & CIO Amanda Fennell chats with guests about maximizing security's greatest asset—people—through meaningful use of technology and process, creative and compassionate training, and the conviction that there is room for taking risk in security.
…
continue reading
A podcast that explores the stories of real people, their work, and its impact on the information security industry. Join security expert Caroline Wong as she focuses on the human side of security. Don't forget to follow the podcast on Twitter: https://twitter.com/humansofinfosec
…
continue reading

1
7MS #672: Tales of Pentest Pwnage – Part 70
55:07
55:07
Play later
Play later
Lists
Like
Liked
55:07Today’s a fun tale of pentest pwnage where we leveraged a WinRM service ticket in combination with the shadow credentials attack, then connected to an important system using evil-winrm and make our getaway with some privileged Kerberos TGTs! I also share an (intentionally) vague story about a personal struggle I could use your thoughts/prayers/vibe…
…
continue reading

1
Ep. 8 – OTP Flaw & Remote Code Execution: When Small Flaws Go Critical
15:45
15:45
Play later
Play later
Lists
Like
Liked
15:45A broken logout flow let attackers hijack accounts using just a user ID. A self-XSS and an IDOR exposed stored data. And a forgotten internal tool—running outdated software—ended in full Remote Code Execution. This episode is all about how small bugs, missed checks, and overlooked services can lead to serious consequences. Chapters: 00:00 - INTRO 0…
…
continue reading

1
#41 How to Actually Become a Great Pentester
38:25
38:25
Play later
Play later
Lists
Like
Liked
38:25What separates a good pentester from a great one? It’s not just about popping shells or passing certs. In this solo episode, I break down the real-world skills that actually matter. Technical, non-technical, and everything in between. I share hard lessons from the field, my thoughts on being well-rounded vs. specialized, and why communication, clie…
…
continue reading
AI tools are transforming how developers write code, and although it’s difficult to pinpoint how much code is now AI-generated code, estimates suggest it’s between 20% and 40%, and this figure is poised to grow in the coming years. This evolution has given rise to a new coding paradigm in which developers act as directors, guiding and refining AI-g…
…
continue reading

1
#43 Grind Now, Relax Later: The Harsh Reality of Breaking Into Cybersecurity ft. Matthew Younker (Zumi Yumi)
34:29
34:29
Play later
Play later
Lists
Like
Liked
34:29In this episode of The Hacker’s Cache, Matthew Younker (aka Zumi Yumi) shares the raw truth about what it really took to break into offensive security, working full time, going to college, and grinding for OSCP with almost zero rest. He opens up about the unhealthy sacrifices he made, why OSWA was harder than OSCP, and how his journey from Army haz…
…
continue reading

1
Startup Founder Lessons on Scaling Teams, Systems, and Culture with Kevin Henrikson
1:16:09
1:16:09
Play later
Play later
Lists
Like
Liked
1:16:09In this episode of Nerding Out with Viktor, host Viktor Petersson is joined by Kevin Henrikson, an experienced engineering leader who's worked with Zimbra, Microsoft, and Instacart, to share real startup founder lessons on how to scale engineering teams, build resilient systems, and manage growth through acquisitions.Kevin explains what founders of…
…
continue reading
Glean is a workplace search and knowledge discovery company that helps organizations find and access information across various internal tools and data sources. Their platform uses AI to provide personalized search results to assist members of an organization in retrieving relevant documents, emails, and conversations. The rise of LLM-based agentic…
…
continue reading

1
Bronwen Aker - harnessing AI for improving your workflows
1:37:26
1:37:26
Play later
Play later
Lists
Like
Liked
1:37:26Guest Info: Name: Bronwen Aker Contact Information (N/A): https://br0nw3n.com/ Time Zone(s): Pacific, Central, Eastern –Copy begins– Disclaimer: The views, information, or opinions expressed on this program are solely the views of the individuals involved and by no means represent absolute facts. Opinions expressed by the host and guests can change…
…
continue reading
Hello! This week Joe “The Machine” Skeen and I kicked off a series all about pentesting GOAD (Game of Active Directory). In part one we covered: Checking for null session enumeration on domain controllers Enumerating systems with and without SMB signing Scraping AD user account descriptions Capturing hashes using Responder Cracking hashes with Hash…
…
continue reading

1
Turing Award Special: A Conversation with Martin Hellman
41:03
41:03
Play later
Play later
Lists
Like
Liked
41:03Martin Hellman is an American cryptographer known for co-inventing public-key cryptography with Whitfield Diffie and Ralph Merkle in the 1970s. Their groundbreaking Diffie-Hellman key exchange method allowed secure communication over insecure channels, laying the foundation for modern encryption protocols. Hellman has also contributed to cybersecur…
…
continue reading

1
#42 Certifications, College, or Bootcamps — What’s Worth It in Cybersecurity? ft. Channa Rajaratne
39:31
39:31
Play later
Play later
Lists
Like
Liked
39:31In this episode, Channa Rajaratne joins me to unpack one of the most common questions in cybersecurity: should you go after certifications, a college degree, or a bootcamp? We break down the pros and cons of each, share personal experiences, and talk about which path actually helped us get hired. Channa also shares his take on underrated skills lik…
…
continue reading

1
Prometheus and Open-Source Observability with Eric Schabell
46:06
46:06
Play later
Play later
Lists
Like
Liked
46:06Modern cloud-native systems are highly dynamic and distributed, which makes it difficult to monitor cloud infrastructure using traditional tools designed for static environments. This has motivated the development and widespread adoption of dedicated observability platforms. Prometheus is an open-source observability tool designed for cloud-native …
…
continue reading

1
7MS #670: Adventures in Self-Hosting Security Services
36:48
36:48
Play later
Play later
Lists
Like
Liked
36:48Hi friends, today I’m kicking off a series talking about the good/bad/ugly of hosting security services. Today I talk specifically about transfer.zip. By self-hosting your own instance of transfer.zip, you can send and receive HUGE files that are end-to-end encrypted using WebRTC. Sweet! I also supplemented today’s episode with a short live video o…
…
continue reading
In this conversation, the host Chris Glanden engages withguests Charlie Northrup and Keenan Hale to discuss advancements in AI, particularly focusing on large language models and their limitations. They explore the concept of Delta K, which refers to the transformation of knowledge, and how it relates to the predictive capabilities of AI. Thediscus…
…
continue reading

1
Reimagining CI/CD and Engineering Culture at Scale with Vlad A. Ionescu from Earthly
1:10:06
1:10:06
Play later
Play later
Lists
Like
Liked
1:10:06In this episode of "Nerding Out with Viktor," host Viktor Petersson is joined by Vlad A Ionescu, founder and CEO of Earthly, to explore the realities of modern CI/CD pipelines, why developer experience remains fragmented, and how platform and security teams can work more effectively across organizations. Vlad outlines the origins of Earthly and how…
…
continue reading

1
Ep. 7 – IDOR & SSTI: From File Theft to Server-Side Secrets
19:35
19:35
Play later
Play later
Lists
Like
Liked
19:35A predictable ID exposed private documents. A crafted name leaked backend files. In this episode, we break down two high-impact flaws—an IDOR that let attackers clone confidential attachments, and an SSTI hidden in an email template that revealed server-side files. Simple inputs, big consequences. Learn how they worked, why they were missed, and ho…
…
continue reading

1
Turing Award Special: A Conversation with David Patterson
55:46
55:46
Play later
Play later
Lists
Like
Liked
55:46David A. Patterson is a pioneering computer scientist known for his contributions to computer architecture, particularly as a co-developer of Reduced Instruction Set Computing, or RISC, which revolutionized processor design. He has co-authored multiple books, including the highly influential Computer Architecture: A Quantitative Approach. David is …
…
continue reading

1
Uber’s On-Call Copilot with Paarth Chothani and Eduards Sidorovics
44:21
44:21
Play later
Play later
Lists
Like
Liked
44:21At Uber, there are many platform teams supporting engineers across the company, and maintaining robust on-call operations is crucial to keeping services functioning smoothly. The prospect of enhancing the efficiency of these engineering teams motivated Uber to create Genie, which is an AI-powered on-call copilot. Genie assists with on-call manageme…
…
continue reading

1
7MS #669: What I’m Working on This Week – Part 3
42:37
42:37
Play later
Play later
Lists
Like
Liked
42:37Hi friends, in this edition of what I’m working on this week: 3 pulse-pounding pentests that had…problems Something I’m calling the unshadow/reshadow credentials attack Heads-up on a new video experiment I’m going to try next week
…
continue reading

1
Turing Award Special: A Conversation with John Hennessy
38:53
38:53
Play later
Play later
Lists
Like
Liked
38:53John Hennessy is a computer scientist, entrepreneur, and academic known for his significant contributions to computer architecture. He co-developed the RISC architecture, which revolutionized modern computing by enabling faster and more efficient processors. Hennessy served as the president of Stanford University from 2000 to 2016 and later co-foun…
…
continue reading

1
post-bsides SD discussion, EPSS, the answer I should have given, and 'Lord Brake'
1:16:45
1:16:45
Play later
Play later
Lists
Like
Liked
1:16:45Check out the BrakeSecEd Twitch at https://twitch.tv/brakesec or Youtube: https://youtube.com/c/BDSPodcast join the Discord: https://bit.ly/brakesecDiscord https://arxiv.org/abs/2302.14172 - EPSS whitepaper https://www.linkedin.com/posts/jayjacobs1_epss-threatintel-vulnerabiltymanagement-activity-7308146548767404032-RubN https://www.first.org/epss/…
…
continue reading

1
Sourcegraph and the Frontier of AI in Software Engineering with Beyang Liu
44:19
44:19
Play later
Play later
Lists
Like
Liked
44:19Sourcegraph is a powerful code search and intelligence tool that helps developers navigate and understand large codebases efficiently. It provides advanced search functionality across multiple repositories, making it easier to find references, functions, and dependencies. Additionally, Sourcegraph integrates with various development workflows to st…
…
continue reading

1
7MS #668: Tales of Pentest Pwnage – Part 69
30:22
30:22
Play later
Play later
Lists
Like
Liked
30:22Hola friends! Today’s tale of pentest pwnage talks about abusing Exchange and the Azure ADSync account! Links to the discussed things: adconnectdump – for all your ADSync account dumping needs! Adam Chester PowerShell script to dump MSOL service account dacledit.py (part of Impacket) to give myself full write privileges on the MSOL sync account: da…
…
continue reading

1
Europe's Battle for Tech Sovereignty: Why OpenStack Matters
1:12:11
1:12:11
Play later
Play later
Lists
Like
Liked
1:12:11In this episode of "Nerding Out with Viktor," I'm joined by Johan Christenson, founder of Cleura, to dig into one of the most critical questions facing European tech today: how do we build a sovereign cloud that can actually compete? Johan brings decades of experience in open infrastructure and a front-row seat to the evolution of cloud computing. …
…
continue reading

1
Ep. 6 – 403 Bypass & Request Smuggling: Tiny Tricks, Total Takeover
17:14
17:14
Play later
Play later
Lists
Like
Liked
17:14A single uppercase letter unlocked an admin panel. One malformed request hijacked user sessions. In this episode, we break down two real-world exploits—a 403 bypass and a request smuggling attack—that turned small oversights into full system compromise. Learn how they worked, why they were missed, and what should have been done differently. Chapter…
…
continue reading

1
Turing Award Special: A Conversation with Jeffrey Ullman
37:45
37:45
Play later
Play later
Lists
Like
Liked
37:45Jeffrey Ullman is a renowned computer scientist and professor emeritus at Stanford University, celebrated for his groundbreaking contributions to database systems, compilers, and algorithms. He co-authored influential texts like Principles of Database Systems and Compilers: Principles, Techniques, and Tools (often called the “Dragon Book”), which h…
…
continue reading

1
#40 Proof You Don’t Need a Degree to Succeed in Cybersecurity ft. Zach Winchester
39:37
39:37
Play later
Play later
Lists
Like
Liked
39:37In this episode of The Hacker’s Cache, Kyser Clark and Zach Winchester talk about breaking into cybersecurity without a college degree and why it’s not the dealbreaker people think it is. You’ll hear a real-world story of going from firewall configs to full-time pentesting with just an OSCP and hands-on experience. We also get into hardware hacking…
…
continue reading
In this conversation, Mike Lisi shares his journey into the cybersecurity field, detailing his early interest in computers, the challenges he faced while obtaining his OSCP certification, and his transition into consulting. He discusses the importance of understanding client needs incybersecurity assessments and his leadership role in the Red Team …
…
continue reading

1
Knowledge Graphs as Agentic Memory with Daniel Chalef
53:39
53:39
Play later
Play later
Lists
Like
Liked
53:39Contextual memory in AI is a major challenge because current models struggle to retain and recall relevant information over time. While humans can build long-term semantic relationships, AI systems often rely on fixed context windows, leading to loss of important past interactions. Zep is a startup that’s developing a memory layer for AI agents usi…
…
continue reading

1
March23: buy browser extensions, attackers don't need exploits, socvel CTI quiz
1:12:38
1:12:38
Play later
Play later
Lists
Like
Liked
1:12:38Check out the BrakeSecEd Twitch at https://twitch.tv/brakesec Join the Discord! https://bit.ly/brakesecDiscord Questions and topics: (please feel free to update or make comments for clarifications) * https://techoreon.com/http-flaw-in-apple-passwords-left-iphones-vulnerable/ * https://darkmarc.substack.com/p/attackers-dont-need-exploits-when * http…
…
continue reading
Hey friends, our good buddy Joe “The Machine” Skeen and I are back this week with part 2 (check out part 1!) tackling GOAD SCCM again! Spoiler alert: this time we get DA! YAY! Definitely check out these handy SCCM resources to help you – whether it be in the lab or IRL (in real life): GOAD SCCM walkthrough MisconfigurationManager – tremendous resou…
…
continue reading
Remix is a full-stack, open-source web framework that was developed by the creators of the popular React Router library. It focuses on features such as server-side rendering and efficient data loading, and it emphasizes developer experience. Ryan Florence is a co-creator of React Remix and in this episode he speaks with Josh Goldberg about the Remi…
…
continue reading

1
#39 Q&A: Struggling with Burnout? Here’s Why It Might Be a Good Thing
39:15
39:15
Play later
Play later
Lists
Like
Liked
39:15Burnout sucks, but what if it's actually a sign of growth? In this episode of The Hacker’s Cache, I break down why burnout isn’t always the enemy and how pushing yourself to the limit can actually make you better. Just like lifting weights to failure builds muscle, hitting burnout and recovering makes you mentally stronger. I’ll share my own experi…
…
continue reading

1
Turing Award Special: A Conversation with Jack Dongarra
49:31
49:31
Play later
Play later
Lists
Like
Liked
49:31Jack Dongarra is an American computer scientist who is celebrated for his pioneering contributions to numerical algorithms and high-performance computing. He developed essential software libraries like LINPACK and LAPACK, which are widely used for solving linear algebra problems on advanced computing systems. Dongarra is also a co-creator of the TO…
…
continue reading

1
Interviewing Industry Professional Zoogs! Zoogs Deux!
2:15:10
2:15:10
Play later
Play later
Lists
Like
Liked
2:15:10Zoogs Deux! Zoogs has been busy this past year. Graduating university, new job, still trash (his words) and 2 cats. We have a great candid conversation about Certs, the Tech job market, the Voldemort of Text editors, comfort zones and our favorite Arizona Tall boy flavors. https://www.twitch.tv/b7h30 https://www.youtube.com/@theo6580…
…
continue reading