PodGrabber.com
PodGrabber Logo/Mascot - Blue Gorilla with Red Headphones

Best Cybersecurity Podcasts - Hacking, Threats & InfoSec

Updated 2026-04-11 11:00:02

Click title to play/pause!

Explore the world of cybersecurity with expert-led podcasts on hacking, data privacy, threat intelligence, and information security. Stay ahead of cyber threats, learn from top security professionals, and keep your digital life protected - all free to stream on PodGrabber.
Application Security PodCast
Tue 28 Oct 2025 08:00:00 - Archive | Vote

Application Security PodCast


Brad Geesaman - Redefining AppSec with AI: Shrinking Toil, Expanding Impact - How LLMs are able to reduce toil in triage-heavy AppSec workflows

Application Security PodCast Episode Details

Brad Geesaman, Principal Security Engineer at Ghost, joins the podcast today to explore how AI and large language models are transforming the world of application security. The discussion starts with the concept of "toil"—the repetitive, exhausting work that drains AppSec teams as they struggle to keep up with mountains of security findings and alerts. Brad shares his insights on how LLMs can provide meaningful leverage by handling the heavy lifting of triage, classification, and evidence gat...

Critical Thinking - Bug Bounty Podcast
Thu 09 Apr 2026 04:00:00 - Archive | Vote

Critical Thinking - Bug Bounty Podcast


Episode 169: Attacking OAuth 2.1

Critical Thinking - Bug Bounty Podcast Episode Details

Episode 169: In this episode of Critical Thinking - Bug Bounty Podcast gr3pme goes over some of the changes from OAuth 2.0 vs 2.1 and how Hackers can capitalize.Follow us on twitter at: https://x.com/ctbbpodcastGot any ideas and suggestions? Feel free to send us any feedback here: info@criticalthinkingpodcast.ioShoutout to YTCracker for the awesome intro music!====== Links ======Follow your hosts Rhynorater, rez0 and gr3pme on X: https://x.com/Rhynoraterhttps://x.com/rez0__https://x.com/gr3pmeCritical Research Lab:https://lab.ctbb.show/ ====== Ways to Support CTBBPodcast ======Hop on the CTBB Discord at https://ctbb.show/discord!We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.You can also find some hacker swag at https://ctbb.show/merch!====== This Week in Bug Bounty ======Intigriti is providing free Burp Pro for Hackers!https://www.intigriti.com/blog/news/intigriti-collaborates-with-portswigger-to-support-ethical-hacking-excellence====== Resources ======Django-allauth Account Takeover (ZeroPath Audit)https://zeropath.com/blog/django-allauth-account-takeover-vulnerabilitiesCVE-2025-4144: Cloudflare Workers PKCE Bypasshttps://github.com/cloudflare/workers-oauth-provider/security/advisories/GHSA-qgp8-v765-qxx9CVE-2025-54576: OAuth2-Proxy Auth Bypasshttps://zeropath.com/blog/cve-2025-54576-oauth2-proxy-auth-bypass====== Timestamps ======(00:00:00) Introduction(00:02:16) OAuth 2.0 Standards(00:12:08) Agent to Agent Communication(00:17:19) CVE Case studies

Cyber Distortion Podcast Series
Thu 26 Mar 2026 11:14:00 - Archive | Vote

Cyber Distortion Podcast Series


S5 - Episode 002 – Cicada 3301

Cyber Distortion Podcast Series Episode Details

Cyber Distortion Podcast – Hosted by Kevin Pentecost & Jason Popillion In January 2012, a mysterious message appeared on an obscure corner of the internet — a simple image posted on 4chan with a chilling promise: "We are looking for highly intelligent individuals." What followed was unlike anything the internet had ever seen. Hidden messages. Impossible riddles. Cryptographic puzzles buried in images, music files, and code. Clues scattered across the globe — from obscure websites to real-world posters taped to telephone poles in cities thousands of miles apart. Behind it all was a name that would become internet legend: Cicada 3301. In this episode of The Cyber Distortion Podcast, we dive deep into one of the most enigmatic puzzles ever unleashed online. Was Cicada 3301 a recruitment program for intelligence agencies? A secret society searching for elite cryptographers? Or an elaborate experiment designed to test the limits of human intelligence and collaboration? Join Kevin Pentecost and Jason Popillion, bringing over 50 years of combined cybersecurity experience, as they: Break down how the Cicada puzzles pushed the boundaries of cryptography and problem-solving Explore the hidden techniques used — from steganography to advanced encryption Investigate the theories surrounding who might have been behind the mysterious organization And uncover why, more than a decade later, the true purpose of Cicada 3301 remains unsolved This isn't just a story about puzzles — it's a journey into the strange intersection of cybersecurity, internet culture, and human curiosity. A digital scavenger hunt so complex that only a handful of people in the world were able to follow it to the end… and even they still don't fully understand who was waiting at the finish line. Are you ready to follow the clues? Resources Explore the Actual Puzzle Archive If your listeners want to see the real puzzle files and clues, this is one of the best archives online: Complete Cicada 3301 Archive (GitHub) This repository contains: Original images used in the puzzles Clues from 2012, 2013, and 2014 puzzles Hidden files extracted from the images Documentation from the community of solvers The puzzles first appeared in 2012 on 4chan, challenging users to uncover hidden messages embedded in images and code. Audio - Suspicious Atmosphere - Cyberpunk Hacker Loop - True Crime Investigation - The Truth is Here Provided by Filmora - Splatter Horror Silence 01 - Social Crisis Provided by: Audiostock - A Sinister Plot 1285 Provided by: Universal Music for Creators 🎧

Cyber Security Headlines
Fri 10 Apr 2026 02:00:00 - Archive | Vote

Cyber Security Headlines


Android API exposure, Acrobat Reader zero-day, Bitcoin Depot cyberattack

Cyber Security Headlines Episode Details

Google API keys in Android apps expose Gemini endpoints Acrobat Reader zero-day flaw exploited since December Cryptocurrency ATM company Bitcoin Depot reports cyberattack Check out our show notes here: https://cisoseries.com/cybersecurity-news-android-api-exposure-acrobat-reader-zero-day-bitcoin-depot-cyberattack/ Huge thanks to our episode sponsor, Vanta Risk and regulation ramping up—and customers expect proof of security just to do business. Vanta's automation brings compliance, risk, and customer trust together on one AI-powered platform. So whether you're prepping for a SOC 2 or running an enterprise GRC program, Vanta keeps you secure—and keeps your deals moving. Learn more at vanta.com/ciso.

Cybersecurity Today
Fri 10 Apr 2026 23:10:00 - Archive | Support w/ Donations | Vote

Cybersecurity Today


Jeff Williams CTO Cofounder of Contrast Security and OWASP co-founder on Mythos and AI Security

Cybersecurity Today Episode Details

AI-Powered AppSec, OWASP Origins, and Anthropic's "Mythos" Model: Jeff Williams on What Changes Next Cybersecurity Today would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete networking stack, wired, wireless and cellular in one integrated solution that's built for performance and scale. You can find them at Meter.com/cst Jim hosts Jeff Williams (Contrast Security co-founder/CTO and former OWASP global chair) for a wide-ranging discussion that begins with Anthropic's new "Mythos" model, described as powerful for finding zero-day vulnerabilities, and expands into how AppSec must evolve. Williams explains Contrast's runtime instrumentation approach, recounts OWASP's early days, the creation of WebGoat and the OWASP Top 10, and notes that many common vulnerabilities persist despite years of maturity models. They debate open source versus commercial security scrutiny, the likely high cost and scalability limits of advanced AI vulnerability discovery, and why finding more bugs matters only if remediation improves too. Williams argues for AI-powered "software factories" with feedback loops, assurance evidence, and runtime monitoring, and flags the EU Product Liability Directive treating software as a product with no-fault liability for security defects, including those from embedded open source. 00:00 AppSec Stuck in Ruts 00:42 Show Intro and Sponsor 01:40 What Contrast Security Does 02:35 OWASP Origins and WebGoat 04:33 Why the Top 10 Persists 06:28 Mythos Model Overview 08:05 Open Source Scrutiny Myth 11:31 Cost and Adoption Barriers 15:04 Finding vs Fixing Bugs 15:55 AI Code Quality Reality 17:46 AI Powered Software Factory 23:11 Building with AI in Practice 25:18 AppSec Metrics and New Approaches 26:42 Staying Optimistic as a CISO 28:00 EU Product Liability Shift 32:13 Bug Bounties in an AI World 34:06 Wrap Up and Outro

CyberWire Daily
Sat 11 Apr 2026 02:00:00 - Archive | Vote

CyberWire Daily


A wolf in admin clothing. [Research Saturday]

CyberWire Daily Episode Details

Today we are joined by Selena Larson, Threat Researcher from Proofpoint research team and co-host of Only Malware in the Building, talking about their work on "(Don't) TrustConnect: It's a RAT in an RMM hat." Proofpoint uncovered TrustConnect, a malware-as-a-service platform posing as a legitimate remote monitoring and management (RMM) tool, but actually functioning as a remote access trojan (RAT) sold to cybercriminals for $300/month. The operation used a fake business website, legitimate-looking certificates, and branded installers (like fake Microsoft Teams or Zoom apps) to trick victims, while providing attackers with full remote control, file transfer, and surveillance capabilities. Although parts of its infrastructure were disrupted, the threat actor quickly rebounded with new variants, highlighting both the resilience of the operation and its deep ties to the broader cybercriminal ecosystem abusing RMM tools. The research and executive brief can be found here: (Don't) TrustConnect: It's a RAT in an RMM hat Learn more about your ad choices. Visit megaphone.fm/adchoices

Darknet Diaries
Tue 07 Apr 2026 02:00:00 - Archive | Vote

Darknet Diaries


172: SuperBox

Darknet Diaries Episode Details

What if there was a device which gave you endless movies and TV shows without ads? Ok great sign me up! In this episode we interview “D3ada55”, who found such a device, but as she gazed into it, she discovered it gazing back at her. Sponsors Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. This episode is sponsored by Meter, the company building networks from the ground up. Meter delivers a complete networking stack - wired, wireless, and cellular - in one solution that’s built for performance and scale. Alongside their partners, Meter designs the hardware, writes the firmware, builds the software, manages deployments, and runs support. Learn more at meter.com. This episode is sponsored by Exaforce. Exaforce was created to handle the complete security operations workflow - detect, triage, investigate, respond. Exabots autonomously manage every stage, eliminating gaps between alert and action that slow down traditional security operations. And how it works is simple too: the exabots ingest all security data and then semantically connects it to understand the full context of security events and how they relate to each other. Learn more at exaforce.com/darknet-diaries.

Defense in Depth
Thu 09 Apr 2026 05:00:00 - Archive | Vote

Defense in Depth


How Should We Measure the Performance of a CISO?

Defense in Depth Episode Details

How Should We Measure the Performance of a CISO? All links and images can be found on CISO Series. Check out this post from the cybersecurity subreddit for the discussion that is the basis of our conversation on this week's episode co-hosted by me, David Spark, the producer of CISO Series, and Edward Contreras, senior evp and CISO, Frost Bank. Joining them is Jason Richards, vp, information security, CHG Healthcare. In this episode: Likability as a career strategy The storytelling gap How the math actually gets done The unofficial scorecard A huge thanks to our sponsor, ThreatLocker ThreatLocker makes Zero Trust practical. With Default Deny, Ringfencing, and Elevation Control, CISOs get real control that's easy to manage and built to scale. Stop threats before they execute and reduce operational noise without adding complexity. See how simple prevention can be at ThreatLocker.com/CISO.

Down the Security Rabbithole Podcast
Tue 07 Apr 2026 06:00:00 - Archive | Vote

Down the Security Rabbithole Podcast


DtSR Episode 700 - An Unreal Milestone

Down the Security Rabbithole Podcast Episode Details

TL;DR: THANK YOU. I can't believe I'm dropping episode 700. It's been a journey since September 2011 - so many amazing and unbelievable guests, conversations, and life lessons. So much incredible content that ages like fine wine, thank you to my friends James Jardine and Jim Tiller for doing this thing. Thank you to all of YOU for listening, sharing, and rating us. This is the industry's premier podcast for all things related to our profession. Here's to another 700. YouTube video: ...

Forensic Fix
Wed 25 Mar 2026 03:00:00 - Archive | Vote

Forensic Fix


Forensic Fix Episode 26

Forensic Fix Episode Details

In this episode, Matt AKA Billy Humphries, a blockchain and cryptocurrency investigations expert, shares his extensive journey from traditional law enforcement to digital forensics and crypto intelligence. Discover how technology has evolved in investigations, the current state of crypto artifacts in digital forensics, and why agencies must adapt to stay effective in a rapidly changing landscape. If you want to be sure you are up to date with the latest in DFIR, don’t miss an episode!

Hacking Humans
Thu 09 Apr 2026 00:00:00 - Archive | Vote

Hacking Humans


When “opportunity” knocks, don’t answer.

Hacking Humans Episode Details

This week, hosts of N2K CyberWire ⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ and⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ alongside ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ are discussing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Your favorite follow up story is back, this time Sue from Australia discusses why Joe’s hen is losing feathers. Dave’s story is on a sophisticated LinkedIn phishing scam that tricks professionals with fake notifications and counterfeit login pages to steal credentials. Joe discusses a bizarre Everest scam where climbers and Sherpas were targeted with fake rescue schemes, highlighting the surprisingly high number of visitors versus summiters. Maria has the story of IRS and tax-related scams warning taxpayers about ghost preparers, urgent payment demands, and fraudulent contact attempts, with Proofpoint noting the use of remote monitoring tools in 40% of 2026 cases. Our catch of the day comes from Reddit, where a likely “stranded in the woods” scam involving a man named Michael begins to unfold but quickly unravels after he overwhelms the interaction with constant ChatGPT-style questioning. Resources and links to stories: ⁠LinkedIn Phishing Scam Uses Fake Notifications to Hijack Accounts Everest guides accused of poisoning foreign climbers to force fake rescues in $20m scam Surge in sophisticated tax scams reported by BBB ahead of deadline Security brief: tax scams aim to steal funds from taxpayers The Guy in the Woods - Seduction on Scrabble - Part 1 ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.

Phillip Wylie Show
Wed 08 Apr 2026 09:00:00 - Archive | Vote

Phillip Wylie Show


From Pro Wrestler to Pentester: My Cybersecurity Origin Story

Phillip Wylie Show Episode Details

How do you go from professional wrestling and powerlifting to a career in cybersecurity and penetration testing?In this special solo episode of The Phillip Wylie Show, Phillip Wylie shares his personal hacker origin story and the unconventional path that led him from wrestling matches and construction jobs to becoming a penetration tester, security evangelist, author, and podcast host.If you're trying to break into cybersecurity, transition from IT, or wondering if it's too late to start, this episode shows that there is no single path into security.Phillip discusses how curiosity, persistence, mentorship, public speaking, and content creation helped shape his career and how you can apply these same principles to your own journey.========================= Connect with your host, Phillip Wylie: LinkedIn: https://linkedin.com/in/phillipwylieX: https://x.com/PhillipWylieInstagram: https://www.instagram.com/phillipwylie

Phoenix Cast
Sun 05 Apr 2026 23:32:25 - Archive | Vote

Phoenix Cast


Kyle Kills Databases

Phoenix Cast Episode Details

In this episode of Phoenix Cast, hosts John and Kyle dive into two cautionary tales from Kyle’s AI-powered workflow — one where he spent $70 proving that AI detection tools are fundamentally broken, and another where he nearly lost his entire CRM database to a vibe-coded update gone wrong. Kyle walks through his process of writing a Marine Corps Gazette article using AI as a drafting assistant, only to have two leading detection tools flag it as “100% AI” three times in a row — sparking a broader debate about whether “did AI write this?” is even the right question to ask. Then things get real when Kyle discovers his customer database has been wiped by a bad code push, blindly trusts AI’s hallucinated diagnosis, and burns three and a half hours chasing ghosts before realizing the data was there all along. It’s a masterclass in why human-in-the-loop verification matters, why the basics like backups still apply in the age of vibe coding, and why tokens are cheap but trust is expensive.Links:AI Snake Oil: What Artificial Intelligence Can Do, What It Can’t, and How to Tell the Differencehttps://a.co/d/09aSZxzu Vibe Coding: Building Production-Grade Software with GenAI, Chat, Agents, and Beyondhttps://a.co/d/0j6Uj0K5

Risky Business
Thu 09 Apr 2026 16:33:35 - Archive | Vote

Risky Business


Snake Oilers: Burp AI, Sondera and Truffle Security

Risky Business Episode Details

In this edition of the Snake Oilers podcast three vendors stop by to pitch the audience on their products: Burp AI and DAST: The founder of PortSwigger and creator of legendary security software Burp Suite, Dafydd Stuttard, drops by to pitch listeners on Burp AI and Burp Suite DAST. Sondera: Josh Devon talks about Sondera, a technology designed to intervene when AI models start doing the wrong thing by statefully tracking their trajectories. This isn’t a permissions suite for AI agents, it’s a way to stick agents in a harness and make sure they adhere to hard policy boundaries. Truffle Security: Dylan Ayrey, the founder of Truffle Security, joins Risky Business again to talk through the latest bells and whistles in Trufflehog, a security tool that searches for exposed secrets and validates them. The Truffle team has done a lot of work on the remediation part of their product over the last few years, and Dylan tells us all about it! This episode is also available on YouTube

Secure AF - A Cybersecurity Podcast
Wed 08 Apr 2026 12:00:00 - Archive | Vote

Secure AF - A Cybersecurity Podcast


Google Chrome Zero-Days Under Active Attack – What SOCs Need to Do Now

Secure AF - A Cybersecurity Podcast Episode Details

Got a question or comment? Message us here! Chrome just became the attack surface of the week. We’re breaking down the latest zero-day exploits, what attackers are doing with them, and how SOC teams can respond before it turns into something bigger. Support the show Watch full episodes at youtube.com/@aliascybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.

Security Now
Unknown Date - Archive | Vote

Security Now


SN 1073: The FCC Bans New Consumer Routers - LinkedIn's JavaScript Bombshell

Security Now Episode Details

The FCC has banned all new consumer routers made outside the US, leaving networks stuck with aging, insecure hardware while blocking innovation. Find out why this sweeping move is raising eyebrows and lawsuits—and why it makes zero sense for cybersecurity. Apple's 26.4 age queries catches many by surprise. LinkedIn's 2.7 MB of privacy-invading javascript. Microsoft starts forcing Win11 24H2 to 25H2. Cisco loses source code to the Trivy supply-chain mess. Proton introduces privacy-first voice and video "Meet." GitHub to fix lagging security of its Actions feature. Cloudflare reaffirms the privacy of its 1.1.1.1 DNS. Cloudflare uses AI to re-code better secure Wordpress. The FCC drops a ban on all new consumer-grade routers. Show Notes - https://www.grc.com/sn/SN-1073-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: meter.com/securitynow zscaler.com/security material.security bitwarden.com/twit hoxhunt.com/securitynow

Shared Security
Sun 05 Apr 2026 23:00:29 - Archive | Vote

Shared Security


Meta & YouTube Found Negligent: A Turning Point for Big Tech?

Shared Security Episode Details

A landmark jury verdict has found Meta and YouTube negligent in a social media addiction case, raising major questions about platform accountability and legal protections under Section 230. This episode covers the details of the case, why the ruling is significant, and what it could mean for the future of social media, privacy, and cybersecurity. Could this trigger a wave of lawsuits against tech companies? And are platforms finally being held accountable? ** Links mentioned on the show ** Jury rules against Meta, YouTube in bellwether teen addiction case https://www.businessinsider.com/social-media-addiction-trial-jury-verdict-meta-youtube-negligent-2026-3 Meta, YouTube verdict could trigger cascade of social media lawsuits: expert https://www.ktvu.com/news/expert-says-meta-youtube-verdict-could-trigger-cascade-social-media-lawsuits The Social Dilemma Documentary https://thesocialdilemma.com/ ** Watch this episode on YouTube ** ** Become a Shared Security Supporter ** Get exclusive access to bonus episodes, listen to new episodes before they are released, receive a monthly shout-out on the show, and get a discount code for 15% off merch at the Shared Security store. Become a supporter today by going to our YouTube channel’s membership section: https://www.youtube.com/channel/UCg9CCDIYkDDqwEZ3UYaxjnA/join ** Thank you to our sponsors! ** SLNT Visit slnt.com to check out SLNT’s amazing line of Faraday bags and other products built to protect your privacy. As a listener of this podcast you receive 10% off your order at checkout using discount code “sharedsecurity”. ** Subscribe and follow the podcast ** Subscribe on YouTube: https://www.youtube.com/c/SharedSecurityPodcast Follow us on Bluesky: https://bsky.app/profile/sharedsecurity.bsky.social Follow us on Mastodon: https://infosec.exchange/@sharedsecurity Join us on Reddit: https://www.reddit.com/r/SharedSecurityShow/ Visit our website: https://sharedsecurity.net Subscribe on your favorite podcast app: https://sharedsecurity.net/subscribe Sign-up for our email newsletter to receive updates about the podcast, contest announcements, and special offers from our sponsors: https://shared-security.beehiiv.com/subscribe Leave us a rating and review: https://ratethispodcast.com/sharedsecurity Contact us: https://sharedsecurity.net/contact The post Meta & YouTube Found Negligent: A Turning Point for Big Tech? appeared first on Shared Security Podcast.

Simply Offensive
Tue 07 Apr 2026 08:00:00 - Archive | Vote

Simply Offensive


The AI Revolution: How Jobs Will Change by 2030 with Nicolas Chaillan

Simply Offensive Episode Details

Nicolas Chaillan on AI Replacing Jobs, National Security, and Staying Relevant in the AI EraEpisode SummaryIn this episode of Simply Offensive, host Phillip Wylie sits down with entrepreneur and former U.S. Air Force and Space Force Chief Software Officer Nicolas Chaillan. Nicolas shares his journey from coding at age seven to founding multiple companies, working in government leadership, and building AI-driven businesses.The conversation explores the rapid evolution of AI, the reality of job displacement, how AI agents are already replacing entire teams, and what skills professionals need to remain relevant. Nicolas also discusses national security concerns around AI adoption, government innovation challenges, and why individuals must embrace AI rather than ignore it.Listeners will gain practical insights into how AI is transforming careers, entrepreneurship, and global competition, along with advice on how to adapt to the coming disruption.Connect with Nicolas Chaillan:LinkedIn: https://www.linkedin.com/in/nicolaschaillan/=========================Connect with your host, Phillip Wylie:LinkedIn: https://linkedin.com/in/phillipwylieYouTube: https://youtube.com/@PhillipWylie=========================Presented by Suzu Labs=========================All the ways to connect with @Suzulabshttps://suzulabs.comhttps://x.com/suzulabshttps://www.linkedin.com/company/suzu-labs/Chapters00:00 Introduction to Nicholas Chaillan01:53 Nicholas's Journey in Tech and AI03:35 The Impact of AI on Jobs06:27 Nicholas's Book: Replacement10:12 Government and AI: Challenges and Opportunities14:39 Nicholas's Experience in the Pentagon23:04 The Anthropic and Pentagon Situation28:19 Final Thoughts and Future Events32:12 Simply Offensive Outro

The Cyber Threat Perspective
Thu 09 Apr 2026 09:00:00 - Archive | Vote

The Cyber Threat Perspective


Episode 176: Cybersecurity Advice That Sounds Smart But Fails in Practice

The Cyber Threat Perspective Episode Details

In Episode 176 of the Cyber Threat Perspective podcast, Brad and Spencer break down some of the most repeated cybersecurity best practices in the industry and explain why, despite sounding solid on paper, they consistently fall short in real IT environments. This isn't about dismissing good security principles. It's about closing the gap between advice that looks great in a framework and controls that actually hold up against how attackers operate. Topics covered include: "Just enable MFA eve...

The Social Engineer Podcast
Mon 16 Mar 2026 01:00:00 - Archive | Vote

The Social Engineer Podcast


Ep. 343 - The Human Element Series - Spark Your Mental Fitness with Todd Bertsch

The Social Engineer Podcast Episode Details

Today we are joined by Todd Bertsch. Todd is a keynote speaker, mental fitness coach, and creator of the Spark Framework—a system rooted in neuroscience and behavioral psychology that focuses on building resilience, leadership clarity, and sustainable personal growth through small, consistent changes. After overcoming early struggles with addiction and pivoting from entrepreneurship into coaching during the COVID pandemic, Todd now helps leaders strengthen their "mental muscle" by identifying negative thought patterns and shifting into a more constructive, resilient mindset. [March 16, 2026] 00:00 – Intro 00:26 - Intro Links Social-Engineer.com - http://www.social-engineer.com/ Offensive Security Vishing Services - https://www.social-engineer.com/offensive-security/vishing/ Offensive Security SMiShing Services - https://www.social-engineer.com/offensive-security/smishing/ Offensive Security Phishing Services - https://www.social-engineer.com/offensive-security/smishing/ Call Back Phishing - https://www.social-engineer.com/offensive-security/call-back-phishing/ Adversarial Simulation Services - https://www.social-engineer.com/offensive-security/adversarial-simulation/ Social Engineering Risk Assessments - https://www.social-engineer.com/offensive-security/social-engineering-risk-assessment/ Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb CLUTCH - http://www.pro-rock.com/ innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/ 01:27 - Todd Bertsch Intro 02:39 - Todd's Origin Story 05:47 - Trauma and the Spark 08:30 - COVID Pivot to Coaching 10:58 - Mental Fitness for Leaders 14:37 - The Spark Framework Explained 17:04 - Curiosity and Burnout 18:37 - Small Steps, Big Change 19:35 - Protein-First Plan 20:09 - Weightloss Breakthrough 21:02 - Micro-Changes for Lifestyle 21:54 - Atomic Habits and Momentum 23:44 - Accountability and Coaching 24:08 - One Inch Wins Story 24:48 - Patience, Gratitude, and the Journey 28:34 - Connect with Todd and Book Picks https://www.toddbertsch.com/ https://www.linkedin.com/in/toddmbertsch/ https://www.instagram.com/theboltwithtoddb/ Recommended Books: The 7 Habits of Highly Effective People – Stephen R. Covey The Go-Giver – Bob Burg & John David Mann 32:12 - Mentors and Closing

The Wake UP X - With Efren L. Salazar | Securing Tomorrow, Empowering Today
Fri 10 Apr 2026 13:44:00 - Archive | Vote

The Wake UP X - With Efren L. Salazar | Securing Tomorrow, Empowering Today


AI Will Make You 140 Hours Productive in a 40 Hour Week. | Jorge Avila

The Wake UP X - With Efren L. Salazar | Securing Tomorrow, Empowering Today Episode Details

🤖 Employers are already expecting 140 hours of work output from a 40 hour week — thanks to AI. Is your business ready?In this episode of The Wake Up X Solutions Podcast, recorded LIVE at RSA Conference 2025, Efren and Jorge Avila of Paleo Tech Group break down why AI is no longer optional for small businesses — and why ignoring it could cost you everything.This isn't just a buzzword. This is the biggest productivity shift in business history. 🚀🔥 What you'll learn in this episode:✅ Why employers now expect 140 hours of work output in a 40 hour week✅ Why AI is the #1 tool for entrepreneurs and small business owners right now✅ The hidden danger of implementing AI without securing your data first✅ How small businesses are losing data by skipping cybersecurity when adopting AI✅ Why if you're not using AI tools yet — you're already falling behind⚠️ Big warning for small business owners: Bringing in AI tools without securing your data first is a serious risk. Before you implement anything — make sure whoever is building it is locking it down. Your business depends on it.💬 Bottom line from Jorge: AI is not a buzzword for entrepreneurs. It is THE tool that will separate businesses that thrive from businesses that get left behind.👇 Connect with Jorge Avila:🌐 paleotechgroup.com💼 LinkedIn: Search Jorge Avila — Paleo Tech Group🎙️ Listen on your favorite platform:🟢 Spotify: https://lnkd.in/gNNknZKj▶️ YouTube: https://lnkd.in/gugPZpFK🎵 Apple Podcasts: https://podcasts.apple.com/us/podcast/wake-up-x-securing-tomorrow-empowering-today-with/id1792821643⏱️ Timestamps:00:00 Intro01:00 The 140 hour work output expectation explained04:00 Why AI tools are a no-brainer for business06:30 The danger of AI without cybersecurity09:00 What small businesses are getting wrong with AI12:00 Why AI is the biggest tool for entrepreneurs right now15:00 How to connect with Jorge and Paleo Tech Group📲 Follow The Wake Up X Solutions:Subscribe for weekly episodes on entrepreneurship, tech, AI, cybersecurity, and empowering the Latino community to build wealth and freedom.#AIForBusiness #SmallBusiness #AITools #Cybersecurity #RSAConference #WakeUpXSolutions #PaleoTechGroup #Entrepreneurship #AIProductivity #BusinessGrowth #LatinoBusiness #Podcast2025 #FutureOfWork