PodGrabber.com
PodGrabber Logo/Mascot - Blue Gorilla with Red Headphones

Best Cybersecurity Podcasts - Hacking, Threats & InfoSec

Updated 2026-03-15 16:23:33

Click title to play/pause!

Explore the world of cybersecurity with expert-led podcasts on hacking, data privacy, threat intelligence, and information security. Stay ahead of cyber threats, learn from top security professionals, and keep your digital life protected - all free to stream on PodGrabber.
Application Security PodCast
Tue 28 Oct 2025 06:00:00 - Archive | Vote

Application Security PodCast


Brad Geesaman - Redefining AppSec with AI: Shrinking Toil, Expanding Impact - How LLMs are able to reduce toil in triage-heavy AppSec workflows

Application Security PodCast Episode Details

Brad Geesaman, Principal Security Engineer at Ghost, joins the podcast today to explore how AI and large language models are transforming the world of application security. The discussion starts with the concept of "toil"—the repetitive, exhausting work that drains AppSec teams as they struggle to keep up with mountains of security findings and alerts. Brad shares his insights on how LLMs can provide meaningful leverage by handling the heavy lifting of triage, classification, and evidence gat...

Critical Thinking - Bug Bounty Podcast
Thu 12 Mar 2026 02:00:00 - Archive | Vote

Critical Thinking - Bug Bounty Podcast


Episode 165: Protobuf Hacking, AI-Powered Bug Hunting, and Self-Improving Claude Workflows

Critical Thinking - Bug Bounty Podcast Episode Details

Episode 165: In this episode of Critical Thinking - Bug Bounty Podcast Justin recaps his Zero Trust World experience, before we dive into Permissions issues client-side bugs, New Hardware Hacking Classes, and using AI to hack.Follow us on twitter at: https://x.com/ctbbpodcastGot any ideas and suggestions? Feel free to send us any feedback here: info@criticalthinkingpodcast.ioShoutout to YTCracker for the awesome intro music!====== Links ======Follow your hosts Rhynorater, rez0 and gr3pme on X: https://x.com/Rhynoraterhttps://x.com/rez0__https://x.com/gr3pmeCritical Research Lab:https://lab.ctbb.show/ ====== Ways to Support CTBBPodcast ======Hop on the CTBB Discord at https://ctbb.show/discord!We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.You can also find some hacker swag at https://ctbb.show/merch!Today's Sponsor: Check out ThreatLocker Ringfencinghttps://www.criticalthinkingpodcast.io/tl-rf====== Resources ======bbscope Updatehttps://x.com/sw33tLie/status/2029344643154919720Matt Brown's Youtube Channelhttps://www.youtube.com/channel/UC3VDCeZYZH7mCihtMVHqppwMatt's Twitter:https://x.com/nmatt0MCP server for HackerOne to search reportshttps://x.com/OriginalSicksec/status/2029503063095124461?s=20Caido Skillshttps://github.com/caido/skillsThe Agentic Hacking Era: Ramblings and a Toolhttps://josephthacker.com/hacking/2026/03/06/the-agentic-hacking-era.htmlAnnouncing AI-driven Caidohttps://caido.io/blog/2026-03-06-caido-skill====== Timestamps ======(00:00:00) Introduction(00:06:23) bbscope report dumping & Matt Brown Training(00:13:10) MCP server for HackerOne to search reports & protobuff success(00:24:24) Hacking Mics with Permissions issues client-side bugs(00:27:26) Can AI Hack things?

Cyber Distortion Podcast Series
Tue 17 Feb 2026 22:40:00 - Archive | Vote

Cyber Distortion Podcast Series


S5 - Episode 001 – The Day that Twitter Died

Cyber Distortion Podcast Series Episode Details

Cyber Distortion Podcast – Hosted by Kevin Pentecost & Jason Popillion On July 15, 2020, the unthinkable happened: dozens of the world's most powerful voices — Barack Obama, Elon Musk, Bill Gates, Joe Biden, Apple, Uber, and more — suddenly blasted the same message out to millions of followers. A promise that sounded too good to be true… because it was. What looked like a generous giveaway turned into one of the most audacious social engineering hacks in tech history — all orchestrated not by a foreign syndicate, not by an elite hacker collective… but by a 17-year-old from Tampa, Florida. In this episode of The Cyber Distortion Podcast, we peel back the curtain on the incredible story of Graham Ivan Clark — the mastermind behind the 2020 Twitter bitcoin scam. How did a teenager with no access to Twitter's code base infiltrate its inner systems? What dark psychology powered the attack? And how did a stunt that netted six figures in Bitcoin come crashing down in just hours? Join Kevin Pentecost and Jason Popillion, together bringing over 50 years of cyber expertise, as we: - Break down the hacker's journey from online forums to global headlines - Decode the social engineering tricks that toppled corporate giant - Reveal the lessons the security world still hasn't fully learned - And explore how a single moment of human error unlocked the keys to a digital kingdom This isn't just a story about stolen Bitcoin — it's a chilling reminder that the weakest link in any system is the human one, and how one kid's curiosity turned into one of the most notorious cybersecurity breaches of our time. Are you ready to join us inside the breach?! Other Helpful Links: Wikipedia – 2020 Twitter account hijacking — comprehensive overview of the incident, how it unfolded, and its impact. 2020 Twitter account hijacking (Wikipedia) Wikipedia – Graham Ivan Clark — detailed background on Clark's role in the hack and related charges. Graham Ivan Clark (Wikipedia) Ars Technica – "I was a teenage Twitter hacker…" — tech-focused reporting on how the social engineering worked and the aftermath. I was a teenage Twitter hacker (Ars Technica) The Hacker News – sentencing & case details — breakdown of charges, Bitcoin scam metrics, and how the hack was executed. 18‑Year‑Old Hacker Gets 3 Years for Massive Twitter Hack (The Hacker News) CoinDesk – coverage of sentencing and legal outcomes — crypto community perspective on the hack and legal resolution. Twitter Hacker Will Serve 3 Years for Crypto Phishing Scheme (CoinDesk) Tech Times – detailed narrative of the incident — narrative explanation of how the scam unfolded and Twitter's response. 'Bitcoin Scam': Teen Twitter Hacker Gets 3 Years (Tech Times) OPB – contemporary reporting from 2020 — quotes from prosecutors and early reporting on the arrest and scope of the hack. Florida Teen Charged as Mastermind (OPB) Wikipedia (alternate language overview) — another useful global perspective on the same incident. Détournement de comptes Twitter en juillet 2020 (Wikipedia

Cyber Security Headlines
Fri 13 Mar 2026 01:00:00 - Archive | Vote

Cyber Security Headlines


Iran boosts cyberattacks, VENON targets Brazilian banks, England Hockey investigates breach

Cyber Security Headlines Episode Details

Iran boosts cyberattacks VENON targets Brazilian banks England Hockey investigates breach Get links to all the stories in our show notes: https://cisoseries.com/cybersecurity-news-iran-boosts-cyberattacks-venon-targets-brazilian-banks-england-hockey-investigates-breach/ Huge thanks to our sponsor, Dropzone AI If you are heading to RSAC next week, here are three things worth seeing at the Dropzone AI Diner. Booth 455, South Expo Hall. One: watch their AI SOC agents investigate real alerts live, with every reasoning step exposed. Two: meet the AI Threat Hunter, the newest agent joining the team. Three: enter the investigation competition and go head to head against the AI. Schedule your stop at dropzone.ai/rsa-2026-ai-diner.

Cybersecurity Today
Fri 13 Mar 2026 21:36:00 - Archive | Support w/ Donations | Vote

Cybersecurity Today


AI Anxiety: Cybersecurity Today with Special Guest Krish Banerjee, Managing Director (Partner) & Canada Lead - Data & AI - Accenture

Cybersecurity Today Episode Details

Gemini in Google Workspace, Agentic AI, and Managing AI Anxiety (with Accenture's Krish Banerjee) Cybersecurity Today would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete networking stack, wired, wireless and cellular in one integrated solution that's built for performance and scale. You can find them at Meter.com/cst In a special edition of Project Synapse shared with Cybersecurity Today, host Jim Love and co-host John Pinard (a VP and CSO at a Canadian financial institution) speak with Krish Banerjee, Accenture's managing director and partner leading AI in Canada. They discuss Google integrating Gemini into Workspace and how AI assistants like Gemini and Microsoft Copilot are converging, along with recent moves around agent platforms and the business models of AI, including Meta and Nvidia's evolving strategies and Nvidia's push toward enterprise agent infrastructure amid rapidly rising compute demand. The conversation explores why AI adoption lags capability, emphasizing task-based redesign, human-in-the-loop guardrails, and not "AI-washing" broken processes. They also address AI anxiety, training and culture change, impacts on education and jobs, and practical ways to use agents to stay informed and productive. 00:00 Sponsor Message 00:20 Show Intro and Guests 01:12 Gemini Comes to Workspace 03:38 AI Tool Leapfrogging 05:06 Agent Network Acquisitions 07:53 Nvidia Bets on Enterprise Agents 11:08 Why AI Adoption Lags 14:27 Agentic AI and Process Redesign 16:19 Security Guardrails and Human Oversight 24:05 Accenture Transformation and Training 26:55 AI Anxiety in the Workplace 30:22 Tasks Not Jobs 32:12 Outcome First Thinking 34:15 Personal AI Assistants 37:24 Building Agents Together 38:35 Executive Learning Curve 44:31 Kids And AI Natives 50:15 Critical Thinking And Trust 54:15 Company Advice Focus Value 55:58 Wrap Up And Sponsor

CyberWire Daily
Sun 15 Mar 2026 00:00:00 - Archive | Vote

CyberWire Daily


Christian Lees: It's not always textbook. [CTO] [Career Notes]

CyberWire Daily Episode Details

Please enjoy this encore of Career Notes. Christian Lees, CTO at Resecurity, shares his story and insight on coming into the cybersecurity world. He considers himself a late bloomer because he did not go to college until he was 23. He wasn’t sure of what he wanted to do, and a family friend gave him a computer and the rest was history, he says. He fell in love with computers and started working at different companies trying to get ahead. He says it's not always textbook, and sometimes you just need to cut your teeth on something to get where you're going. Throughout his journey, he was constantly questioning whether he made the right decision, and in the end he says you have to be willing to "define friction points in it, you may join security field, not knowing what you're gonna do, but by being that curious person and breaking things and putting it back together, you'll find the right way and just never stop being curious." We thank Christian for sharing his story. Learn more about your ad choices. Visit megaphone.fm/adchoices

Darknet Diaries
Tue 03 Mar 2026 00:00:00 - Archive | Vote

Darknet Diaries


171: Melody Fraud

Darknet Diaries Episode Details

What if the music charts you see aren’t real? What if the numbers that define success can be manufactured? We talked to Andrew, a man who has spent his career on both sides of this battle. He once profited from the loopholes in streaming platforms, but now, his job is to close them. This episode will change the way you understand music streaming platforms from now on. Sponsors Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. Support for this show comes from Adaptive Security. Deepfake voices on a Zoom call. AI-written phishing emails that sound exactly like your CFO. Synthetic job applicants walking through the front door. Adaptive is built to stop these attacks. They run real-time simulations, exposing your teams to what these attacks look like to test and improve your defences. Learn more at adaptivesecurity.com. This episode is sponsored by Meter, the company building networks from the ground up. Meter delivers a complete networking stack - wired, wireless, and cellular - in one solution that’s built for performance and scale. Alongside their partners, Meter designs the hardware, writes the firmware, builds the software, manages deployments, and runs support. Learn more at meter.com.

Defense in Depth
Thu 12 Mar 2026 04:00:00 - Archive | Vote

Defense in Depth


Are Your Security Tools Creating More Work for Your Team?

Defense in Depth Episode Details

All links and images can be found on CISO Series. Check out this post by Caleb Sima for the discussion that is the basis of our conversation on this week's episode co-hosted by me, David Spark, the producer of CISO Series, and Edward Contreras, senior evp and CISO, Frost Bank. Joining us is Evan McHenry, CISO, Robinhood. In this episode: The information paradox Setting realistic expectations Prioritization over noise The cart before the horse Huge thanks to our sponsor, Endor Labs Discover how AI coding agents are reshaping software supply chain risk in the State of Dependency Management. Original research from Endor Labs shows 49% of dependency versions have known vulnerabilities (and that 34% don't actually exist). Get the report to see how "shadow AI" is reshaping attack surfaces.

Down the Security Rabbithole Podcast
Tue 10 Mar 2026 04:00:00 - Archive | Vote

Down the Security Rabbithole Podcast


DtSR Episode 696 - Zero Trust CyberSecurity Shenanigans

Down the Security Rabbithole Podcast Episode Details

TL;DR: This week's podcast is live'ish from Zero Trust World 2026, put on by ThreatLocker. It's a lively conversation with their CPO Rob Allen who can't help himself but mess with my recording equipment. Shenanigans ensue. You'll love it. YouTube video: https://youtu.be/aOP6IT8OiDI Have something to say? Let's hear it. Show Sponsor: ThreatLockerAllow what you need, block everything else... Including ransomware.Disclaimer: This post contains affiliate links. If you make a purchas...

Forensic Fix
Wed 10 Dec 2025 00:00:00 - Archive | Vote

Forensic Fix


Forensic Fix Episode 25

Forensic Fix Episode Details

In this episode of Forensic Fix, host Adam Firman interviews Steve Bunting, a seasoned expert in digital forensics. They discuss Steve's journey into the field, the evolution of digital forensics, and the importance of comprehensive evidence gathering. Steve shares innovative approaches to forensic investigations, the challenges faced in modern forensics, and the significance of expert testimony. The conversation also touches on the future of digital forensics, emerging trends, and the need for collaboration across jurisdictions.

Hacking Humans
Wed 11 Mar 2026 22:00:00 - Archive | Vote

Hacking Humans


Defending against unlimited penalty shots. [Hacking Humans Live!]

Hacking Humans Episode Details

This week, hosts of N2K CyberWire ⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ and⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ head to Orlando to attend ThreatLocker's Zero Trust World 2026 (ZTW). There, they discussed the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Joe Carrigan was unable to join the team, but they have a very special guest, host of the BowTieSecurityGuy After Dark podcast, Rob Whetstine. He is one of the featured speakers this week at Zero Trust World, and he shared experiences from his career at companies like Disney and highlights from his ZTW presentation on Phishing. Maria's story involves a Maine Supreme Court hearing on a case involving a financial advisory firm that was mislead by a client. Dave highlights a malvertising campaign by a threat actor researchers call D-Shortiez. In our Catch of the Day, comes from the Scambait Subreddit where Mavis offers up large sums of money for a $50 Visa Debit card. We thank Rob for joining us as our special guest. Resources and links to stories: Maine Law Court hears oral arguments in $1.3M elder scam case. Disrupting 59M Malicious Impressions: Inside D-Shortiez Testing Infrastructure and Campaign Management. Rob Whetstine's ⁠BowTieSecurityGuy After Dark⁠ podcast. ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Have a Catch of the Day you'd like to share? Email it to us at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠hackinghumans@n2k.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.

Phillip Wylie Show
Mon 09 Mar 2026 21:00:00 - Archive | Vote

Phillip Wylie Show


Allie Mellen: Code War

Phillip Wylie Show Episode Details

In this episode of the Phillip Wylie Show, Allie Mellen shares her journey from a computer engineering student to a cybersecurity expert and industry analyst. She discusses the importance of hands-on experience in cybersecurity, the evolution of cybersecurity tools, and the significance of a hacker mindset. Allie also emphasizes the need for clear communication in cybersecurity for non-technical audiences and provides advice on selecting cybersecurity products. Additionally, she introduces her new book, 'Code Nations,' which explores the intersection of cybersecurity and geopolitics, highlighting the impact of global events on cyber warfare strategies.========================= Connect with Allie Mellen:LinkedIn: https://www.linkedin.com/in/hackerxbella/ Allie's book: https://www.amazon.com/dp/1394285574========================= Connect with your host, Phillip Wylie: LinkedIn: https://linkedin.com/in/phillipwylieX: https://x.com/PhillipWylieInstagram: https://www.instagram.com/phillipwylie

Phoenix Cast
Wed 04 Mar 2026 00:30:00 - Archive | Vote

Phoenix Cast


Every Marine an AI Rifleman

Phoenix Cast Episode Details

In this episode of Phoenix Cast, hosts John, Rich, and Kyle dive into a passionate debate about why the military needs to stop relying on a single "AI guy" in every unit and instead adopt an "every Marine an AI rifleman" mentality — training all service members in AI fundamentals the same way every Marine learns basic marksmanship. Kyle breaks down what AI "marksmanship" actually looks like (spoiler: it's way more approachable than you think, and it doesn't require a data science degree), while Rich draws on his experience driving an AI-enabled vehicle to illustrate what real human-machine teaming feels like in practice. The crew also unpacks a recent Claude Code "vulnerability" headline that turns out to be more about prompt injection basics than a true sky-is-falling flaw, and they geek out over Claude Code's new Remote Control feature that lets developers manage coding sessions from their phone while out grabbing groceries. Whether you're a senior leader wondering how to roll out AI training or a Lance Corporal curious about where to start, this one's packed with practical takes and a few great book recommendations to get you moving.We'd love to hear your thoughts! Tweet us @ThePhoenixCast, and don't forget to join our LinkedIn Group to connect with fellow Phoenix Casters. If you enjoyed the episode, help us out by leaving one of those coveted 5-star reviews on Apple Podcasts. Thanks for listening!Links:Claude Remote Code:https://thehackernews.com/2026/02/claude-code-flaws-allow-remote-code.htmlClaude Remote Control:https://code.claude.com/docs/en/remote-controlGenAI.mil:https://www.war.gov/News/Releases/Release/Article/4376420/war-department-launches-ai-acceleration-strategy-to-secure-american-military-ai/

Risky Business
Thu 12 Mar 2026 16:12:14 - Archive | Vote

Risky Business


Risky Biz Soap Box: It took a decade, but allowlisting is cool again

Risky Business Episode Details

In this Soap Box edition of the Risky Business podcast Patrick Gray sits down with Airlock Digital co-founders Daniel Schell and David Cottingham to talk about the role AI models could play in managing enterprise allowlists. They also talk about the durability of allowlisting as a control. After 12 years in business, the Airlock product hasn’t really changed all that much. That’s a good thing! It also means the Airlock team have been able to spend some time doing deep engineering instead of chasing the latest attacker TTPs and writing detection rules for them. This episode is also available on Youtube.

Secure AF - A Cybersecurity Podcast
Fri 13 Mar 2026 10:00:00 - Archive | Vote

Secure AF - A Cybersecurity Podcast


🚨 The Telus Hack – ShinyHunters Strikes a Telecom Giant 🚨

Secure AF - A Cybersecurity Podcast Episode Details

Got a question or comment? Message us here! A massive breach has shaken the telecom world. In this episode of the #SOCBrief, we break down the alleged TELUS hack claimed by the ShinyHunters threat group, what data may have been stolen, and why the potential exfiltration of massive datasets could have far-reaching consequences for organizations worldwide. From OAuth tokens and API keys to customer PII and enterprise systems, we explore how attacks like this unfold and what organizations ...

Security Now
Unknown Date - Archive | Vote

Security Now


SN 1069: You can't hide from LLMs - Was Your Smart TV a Stealth Proxy?

Security Now Episode Details

Think your online alias keeps you safe? This episode reveals how advanced language models are making it trivial to de-anonymize users at scale, challenging everything we thought we knew about internet privacy. Anthropic & Mozilla improve Firefox's security. Apple & Google begin testing cross-platform RCS encryption. Ubuntu's SUDO starts echoing asterisks. Inviting a web proxy into your home. Apple devices cleared by Germany for NATO's use. A serious remote takeover of OpenClaw. TokTok won't encrypt messaging for visibility. Microsoft bans the term "Microslop" on Discord. Lot's of great listener feedback. LLMs could make Orwell's 1984 seem optimistic. Show Notes - https://www.grc.com/sn/SN-1069-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: bitwarden.com/twit zscaler.com/security guardsquare.com hoxhunt.com/securitynow

Shared Security
Sun 08 Mar 2026 21:00:55 - Archive | Vote

Shared Security


TikTok Says No to End-to-End Encryption: Here’s Why That’s a Big Deal

Shared Security Episode Details

In a move that bucks the entire industry trend, TikTok has confirmed it will not implement end-to-end encryption (E2EE) for direct messages on its platform — arguing that E2EE would make users less safe. We break down what’s really going on: the child safety argument, the privacy counterargument, the geopolitical questions surrounding ByteDance, and what it all means for TikTok’s 1 billion+ users. If you use TikTok, this episode is essential listening. ** Links mentioned on the show ** TikTok won’t protect DMs with controversial privacy tech, saying it would put users at risk https://www.bbc.com/news/articles/cly2m5e5ke4o ** Watch this episode on YouTube ** ** Become a Shared Security Supporter ** Get exclusive access to bonus episodes, listen to new episodes before they are released, receive a monthly shout-out on the show, and get a discount code for 15% off merch at the Shared Security store. Become a supporter today by going to our YouTube channel’s membership section: https://www.youtube.com/channel/UCg9CCDIYkDDqwEZ3UYaxjnA/join ** Thank you to our sponsors! ** SLNT Visit slnt.com to check out SLNT’s amazing line of Faraday bags and other products built to protect your privacy. As a listener of this podcast you receive 10% off your order at checkout using discount code “sharedsecurity”. ** Subscribe and follow the podcast ** Subscribe on YouTube: https://www.youtube.com/c/SharedSecurityPodcast Follow us on Bluesky: https://bsky.app/profile/sharedsecurity.bsky.social Follow us on Mastodon: https://infosec.exchange/@sharedsecurity Join us on Reddit: https://www.reddit.com/r/SharedSecurityShow/ Visit our website: https://sharedsecurity.net Subscribe on your favorite podcast app: https://sharedsecurity.net/subscribe Sign-up for our email newsletter to receive updates about the podcast, contest announcements, and special offers from our sponsors: https://shared-security.beehiiv.com/subscribe Leave us a rating and review: https://ratethispodcast.com/sharedsecurity Contact us: https://sharedsecurity.net/contact The post TikTok Says No to End-to-End Encryption: Here’s Why That’s a Big Deal appeared first on Shared Security Podcast.

Simply Offensive
Mon 09 Mar 2026 22:00:00 - Archive | Vote

Simply Offensive


The Future of Pentesting: AI, Automation, and Better Reporting with Dan DeCloss

Simply Offensive Episode Details

In this episode of Simply Offensive, Phillip Wylie interviews Dan DeCloss, founder of PlexTrack, discussing the evolution of cybersecurity, the importance of report writing in pen testing, and the impact of AI on the industry. Dan shares his unique origin story, insights on the challenges of report writing, and how PlexTrack aims to streamline the process. The conversation also explores the future of AI in cybersecurity and its implications for the job market.Connect with Dan DeCloss:LinkedIn: https://www.linkedin.com/in/ddecloss/PlexTrac Website: https://plextrac.com=========================Connect with your host, Phillip Wylie:LinkedIn: https://linkedin.com/in/phillipwylieYouTube: https://youtube.com/@PhillipWylie=========================Presented by Suzu Labs=========================All the ways to connect with @Suzulabshttps://suzulabs.comhttps://x.com/suzulabshttps://www.linkedin.com/company/suzu-labs/Chapters00:00 Introduction and Background of PlexTrack03:15 The Importance of Report Writing in Pen Testing06:09 Dan DeCloss's Origin Story08:45 The Evolution of Cybersecurity and AI11:32 AI's Impact on the Job Market14:14 Future of AI in Cybersecurity16:44 Closing Thoughts and Future Directions28:51 Simply Offensive Outro

The Cyber Threat Perspective
Wed 11 Mar 2026 22:00:00 - Archive | Vote

The Cyber Threat Perspective


Episode 172: The biggest security blind spots in Midsized companies

The Cyber Threat Perspective Episode Details

Hey folks! Greetings from the Offensive Security group at SecurIT360. Brad & Spencer are on this episode of The Cyber Threat Perspective to break down The Biggest Security Blind Spots in Mid-Size Companies. In this episode, we expose the most common (and dangerous) gaps that leave mid-sized organizations wide open: poor asset inventory, flat networks, flat identities, overconfidence in security tools, credential reuse, and the emerging risks with AI. If any of these hit home, go to offs...

The Social Engineer Podcast
Sun 01 Mar 2026 23:00:00 - Archive | Vote

The Social Engineer Podcast


Ep. 342 - The Doctor Is In Series - How Does Decision Fatigue Affect You?

The Social Engineer Podcast Episode Details

Welcome to the Social-Engineer Podcast: The Doctor Is In Series – where we discuss understandings and developments in the field of psychology. In today's episode, Chris and Dr. Abbie discuss decision fatigue—how making too many choices throughout the day drains mental energy and affects judgment. They explain how stress and lack of sleep make it worse, how it differs from burnout, and why leaders and parents are especially vulnerable. The episode also shares simple, practical strategies to reduce daily decisions, protect mental energy, and prioritize recovery. [Mar 2, 2026] 00:00 - Intro 00:56 - Show Updates and Sponsors 02:35 - What Decision Fatigue Is 03:34 - Stress, Sleep, and Mental Energy 05:12 - Mental vs. Physical Limits 07:13 - Decision Fatigue vs. Burnout 10:22 - Leadership, Empathy, and Hard Decisions 14:33 - Prevention: Routines and Breaks 20:43 - Advisors and AI Caution 24:38 - Everyday Life and Parenting Load 27:23 - Recovery Outlets and Wrap-Up 28:49 - Closing and Next Month's Topic (Diet Culture) Find us online: LinkedIn: linkedin.com/in/dr-abbie-maroño-phd Instagram: @DoctorAbbieofficial LinkedIn: linkedin.com/in/christopherhadnagy References: Baumeister, R. F., Bratslavsky, E., Muraven, M., & Tice, D. M. (1998). Ego depletion: Is the active self a limited resource? Journal of Personality and Social Psychology, 74(5), 1252–1265. https://doi.org/10.1037/0022-3514.74.5.1252 Baumeister, R. F., & Tierney, J. (2011). Willpower: Rediscovering the greatest human strength. Penguin Press. Danziger, S., Levav, J., & Avnaim-Pesso, L. (2011). Extraneous factors in judicial decisions. Proceedings of the National Academy of Sciences, 108(17), 6889–6892. https://doi.org/10.1073/pnas.1018033108 Davidson, R. J., & McEwen, B. S. (2012). Social influences on neuroplasticity: Stress and interventions to promote well-being. Nature Neuroscience, 15(5), 689–695. https://doi.org/10.1038/nn.3093 Fleming, S. M., & Dolan, R. J. (2012). The neural basis of metacognitive ability. Philosophical Transactions of the Royal Society B: Biological Sciences, 367(1594), 1338–1349. https://doi.org/10.1098/rstb.2011.0417 Hagger, M. S., Wood, C., Stiff, C., & Chatzisarantis, N. L. D. (2010). Ego depletion and the strength model of self-control: A meta-analysis. Psychological Bulletin, 136(4), 495–525. https://doi.org/10.1037/a0019486 Kahneman, D. (2011). Thinking, fast and slow. Farrar, Straus and Giroux.