A "by Hackers for Hackers" podcast focused on technical content ranging from bug bounty tips, to write-up explanations, to the latest hacking techniques.
…
continue reading
Bug Bounty Podcasts
The show that decrypts the secrets of offensive cybersecurity, one byte at a time. Every week I invite you into the world of ethical hacking by interviewing leading offensive security practitioners. If you are a penetration tester, bug bounty hunter, red teamer, or blue teamer who wants to better understand the modern hacker mindset, whether you are new or experienced, this show is for you.
…
continue reading
The Cyber Riddler is a podcast that discusses interesting topics in the field of information security. It explores different areas and situations in real-life cyber security engagements and activities. Episodes feature guests from different backgrounds such as hackers, security analysts, cyber security managers, bug bounty hobbyists and more.
…
continue reading
A Podcast about bugs, bounties and its researchers. Hosted by Fisher.
…
continue reading
Welcome to the Bug Hunter Podcast by Pentesterland, a podcast for pentesters & bug bounty hunters. We tackle technical questions & inspirational topics to help you develop both a hacker skillset & mindset.
…
continue reading
Behind The Bounty gives you an inside look at the community and people that make bug bounties happen. Hosted by Ben Sadeghipour (NahamSec) and Nathanial Lattimer (d0nut).
…
continue reading
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, develop ...
…
continue reading
Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented by your friendly neighborhood cybersecurity gal Michele Bousquet.
…
continue reading
Welcome to "Crying Out Cloud," the monthly podcast that keeps you up to date with the latest cloud security news. Hosted by experts Eden Naftali and Amitai Cohen, each episode provides in-depth coverage of the most important vulnerabilities and incidents from the previous month. Tune in for insightful analysis and expert recommendations to help you safeguard your cloud infrastructure.
…
continue reading
A weekly podcast of all things application security related. Hosted by Ken Johnson and Seth Law.
…
continue reading
Security veterans Joe Patti and Adam Roth share cyber security insights from their virtual bar stools. Join Joe and Adam, along with a diverse lineup of industry insiders, for a view into how the professionals see the security issues that impact all of us. Tune in for engaging discussions, expert analyses, and a behind-the-scenes look into the cybersecurity world. Reach us at [email protected] or @SecCocktailHour on Twitter.
…
continue reading
Hack for Fun and Profit is a weekly podcast for anyone who is interested in ethical hacking. The topics include bug bounty hunting, penetration testing, red teaming and many more. Sit back and enjoy stories, tips and tricks that will inspire you. For subscription-only episodes, enroll using this link: https://anchor.fm/thehackerish/subscribe
…
continue reading
Future Secured brings you in-depth conversations with Australian and global cyber security leaders, founders, CEOs, and co-founders. Hosted by Jason Murell and Tom Finnigan, each episode delves into the personal journeys of these experts as they navigate the challenges of building and scaling successful cyber security businesses. From critical industry issues to hard-learned lessons, the podcast explores the competitive global market and offers valuable insights on how to start, grow, and su ...
…
continue reading
Welcome to eCommerceAholic, where we help you get more from your eCommerce store.
…
continue reading
A podcast about the makers and breakers shaping cybersecurity. New episodes every other Monday! Go to https://hackerculture.fm for more information!
…
continue reading
Welcome to Behind the Binary, the podcast that introduces you to the fascinating people, technology, and tools driving the world of reverse engineering. Join your host, Josh Stroschein, a reverse engineer with the FLARE team at Google, and someone passionate about sharing knowledge and shedding light on the art of reverse engineering, as he sits down with intriguing guests to explore the human side of this profession. Behind the Binary goes beyond the code, sharing the stories, motivations, ...
…
continue reading
Hacker Talk brings you interesting conversation between some of the world best hackers, cyber security professionals and information security people.
…
continue reading
In "Surfacing Security," we explore a variety of cybersecurity topics relevant to Attack Surface Management and beyond. Your co-hosts are Michael Gianarakis (Assetnote Co-Founder/CEO) and Shubham Shah (Assetnote Co-Founder/CTO).
…
continue reading
The Business Security (BizSec) Podcast. Hosts Beau Woods and Dave Kennedy analyze and discuss the latest business news in the information and technology security world, as well as a bigger picture theme each episode. Follow us @bizsecpodcast
…
continue reading
STEM brother Basir Vincent podcast sharing small connect with the Tech bytes to encourage thought about STEM and STEAM engagement. Cover art photo provided by Oliver Pecker on Unsplash: https://unsplash.com/@ollipexxer
…
continue reading
Building better software, one incident at a time. Host Kevin Riggle talks with software engineers about that time they broke production. Whether you're an industry professional, or just curious about what makes the modern Internet run and what happens when it breaks, we bring you stories you haven't heard elsewhere. This is the audio version of the podcast. Watch on YouTube: https://youtube.com/@critical-point Produced by Complex Systems Group (https://complexsystems.group). Part of Critical ...
…
continue reading
Join us as we watch and discuss the entire Star Wars Canon from The Phantom Menace to the Force Awakens and beyond! Co-hosts Mondo, Joe (both from Not the Show) and with Ty (from Geek Fight Club's Chaos Inc.) talk about what they love and hate about The Saga.
…
continue reading
An insanely enjoyable Bitcoin podcast with a strong focus on liberty. Every Thursday, we chat about how Bitcoin sets the world free and share the latest cryptocurrency news and general Bitcoin talk. Guests have included: - Mastering Bitcoin author Andreas Antonopoulos - Liberty.me CLO Jeffrey Tucker - Antiwar.com editor Angela Keaton - Bitcoin/liberty activist Michele Seven - Jason King from Sean's Outpost Homeless Outreach - Drew Phillips from Bitcoin Not Bombs - Numerous other Bitcoin-lovi ...
…
continue reading

1
Episode 141: Hacking the Pod - Google Docs 0-day & React CreateElement Exploits with Nick Copi (7urb0)
1:23:31
1:23:31
Play later
Play later
Lists
Like
Liked
1:23:31Episode 141: In this episode of Critical Thinking - Bug Bounty Podcast Justin sits down with Nick Copi to talk about CSPT, React, CSS Injections and how Nick hacked the pod. Follow us on twitter at: https://x.com/ctbbpodcast Got any ideas and suggestions? Feel free to send us any feedback here: [email protected] Shoutout to YTCracker …
…
continue reading
The finale of HBO's Silicon Valley series pointed up a subtle parallel to the real-world challenges in vulnerability reporting—rather than risk going to jail, Pied Piper chose to burn the company to the ground. For decades, white hat and gray hat hackers had no place to report cybersecurity flaws without fear of legal hassles. Nowadays we have Bug …
…
continue reading

1
Ep. 60: Crypto Kidnappings, Lost Keys, and Million-Dollar Bug Bounties
1:05:08
1:05:08
Play later
Play later
Lists
Like
Liked
1:05:08Forbes 30 Under 30 cybersecurity expert Yevheniia Broshevan discusses crypto security challenges, bug bounty programs, and the reality that 95% of Bitcoin has been mined while 11-18% is lost forever. 🔥 What You'll Learn: The concerning trend in crypto losses hitting $3 billion this year alone How bug bounties in Web3 can reach up to $10 million for…
…
continue reading

1
#64 Job Interview Secrets From the Other Side of the Table ft. Vladimir Ichkov
37:09
37:09
Play later
Play later
Lists
Like
Liked
37:09Senior penetration tester Vladimir Ichkov shares what really matters in cybersecurity job interviews from the perspective of both a candidate and an interviewer. We discuss the role of soft skills, confidence, and humor in landing a pentesting job, common red flags that turn interviewers away, and how technical experience as a system administrator …
…
continue reading

1
AI cyber attacks need AI cyber defense: Ransomware's new danger and how a top expert is fighting back
57:32
57:32
Play later
Play later
Lists
Like
Liked
57:32Everyone's using AI, including ransomware gangs. Podcast guest Karin Lagziel, Director Cybersecurity at consulting firm Sygnia, gives us the news and her cyber defense strategies for fighting back: With more AI, as well as a focus on fundamentals. In this episode: 🔹 The first AI-powered ransomware "Prompt Lock" discovered in the wild 🔹 How Chinese …
…
continue reading

1
Quick Tip: Protecting Your Money With Face ID
4:28
4:28
Play later
Play later
Lists
Like
Liked
4:28There's a new scam going around, where a thief gets you to unlock your phone under the guise of needing to make a call, then runs off with the phone and sends themselves all your money through your apps. Learn how to protect yourself and your money with a simple smartphone trick for iPhone and Android. Send us a text Support the show Join our Patre…
…
continue reading
Dive into the hidden world of Windows Event Logs — where SOC analysts uncover patterns, trace intrusions, and expose how attackers exploit the very logs meant to catch them. Learn how to spot the signals, build timelines, and stay one step ahead of the breach. X: @almorabea X: @CyberRiddler Website: https://thecyberriddler.com…
…
continue reading

1
Episode 140: Crit Research Lab Update & Client-Side Tricks Galore
57:41
57:41
Play later
Play later
Lists
Like
Liked
57:41Episode 140: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joseph give an update from The Crit Research Lab, as well as some writeups on postMessage vulnerabilities, Cookie Chaos, and more. Follow us on X at: https://x.com/ctbbpodcast Got any ideas and suggestions? Send us feedback at [email protected] Shoutout …
…
continue reading

1
EP15 Getting Ready for FLARE-On 12 - An Inside Look at the Reverse Engineering Gauntlet
39:13
39:13
Play later
Play later
Lists
Like
Liked
39:13In this episode, we're "Getting Ready for FLARE-On 12" with an inside look at the world-renowned reverse engineering competition. We’re joined by long-time FLARE-On host and challenge author Nick Harbour and regular challenge author Blas Kojusner for an in-depth conversation. We'll take a brief tour of FLARE-On history and discuss how it has grown …
…
continue reading

1
#63 Q&A: Outwork 1,000 Applicants to Break Into Cybersecurity
35:17
35:17
Play later
Play later
Lists
Like
Liked
35:17Breaking into cybersecurity isn’t about being “good enough.” It’s about outworking the 1,000 other applicants fighting for the same job. In this episode of The Hacker’s Cache podcast, I share the raw truth about competing in today’s cybersecurity job market, why certifications and hands-on projects matter more than ever, and how to stand out when e…
…
continue reading
In what is (sadly) becoming a weekly segment, this episode starts with talk of the latest installment of npm package takeovers, dubbed Shai Hulud as discussed in Slack and analyzed by Paul McCarty and team. Strategies discussed for monitoring packages and preventing malware from entering into organization's products. This is followed by an article …
…
continue reading

1
eBPF, Fishy Book Covers, and Open Source Security with Liz Rice
33:08
33:08
Play later
Play later
Lists
Like
Liked
33:08🚨 The kernel-level security revolution you can't ignore — a must-listen with Liz Rice Eden Naftali and Amitai sit down with Liz Rice, Chief Open Source Officer at Isovalent (Cisco), and a global expert in eBPF, containers, and Kubernetes security. 🎙️ In this episode: How eBPF is reshaping cloud security from the ground up Practical strategies to ta…
…
continue reading

1
Future Secured Ep 45 Karim Toubba CEO, LastPass on Passwords, Passkeys, and the Shadow IT problem
45:08
45:08
Play later
Play later
Lists
Like
Liked
45:08What does a world without passwords actually look like and how close are we? In this episode of Future Secured, Karim Toubba, CEO of LastPass, explores the shifting future of password management, identity security and user authentication in an era defined by AI, Shadow IT and cloud-first business models. With over 25 years in cybersecurity leadersh…
…
continue reading

1
Episode 139: James Kettle - Pwning in Prod & How to do Web Security Research
2:21:51
2:21:51
Play later
Play later
Lists
Like
Liked
2:21:51Episode 139: In this episode of Critical Thinking - Bug Bounty Podcast Justin finally sits down with the great James Kettle to talk about HTTP Proxys, metagaming research, avoiding burnout, and why HTTP/1.1 must die! Follow us on twitter at: https://x.com/ctbbpodcast Got any ideas and suggestions? Feel free to send us any feedback here: info@critic…
…
continue reading

1
#62 Is InfoSec Slowing Down? Threat Models Explained ft. Carl Vincent (vyrus)
39:49
39:49
Play later
Play later
Lists
Like
Liked
39:49In this episode of The Hacker’s Cache, Kyser Clark sits down with Carl Vincent, better known as Vyrus, to unpack the shifting realities of cybersecurity. Carl shares straight talk on the Silver Bullet ecosystem that fraud actors rely on, why today’s cybercrime is more about account access than shell popping, and how blue teams can actually turn cri…
…
continue reading
The Absolute AppSec duo returns with an in-depth episode talking about true and false positives, where context matters and business impact must be taken into account in order to avoid rabbit holes. This discussion spurred by a recent article from signalblur of magonia.io discussing alerts in a security operations center. In short, only considering …
…
continue reading

1
You Can't Secure What You Can't See - From Wall Street to Field CISO: Future Secured EP 44
46:15
46:15
Play later
Play later
Lists
Like
Liked
46:15In this episode, Liz Morton, Field CISO at Axonius, shares her 25-year journey through IT and cybersecurity, including nearly a decade at the Intercontinental Exchange that looks after the New York Stock Exchange. She discusses the transition from practitioner to Field CISO, the persistent challenges of visibility and asset management and the reali…
…
continue reading

1
Red Team: The Best Job in Cybersecurity (Until You Get Arrested)
28:30
28:30
Play later
Play later
Lists
Like
Liked
28:30What is Red Teaming, and what does it have to do with cybersecurity? In this episode, we look at how Red Teamers are hired to attack company security using all manner of tactics, from tossing malware-infested USB sticks into parking lots to posing as an HVAC technician. We also take a look at one of the most notorious Red Team exercises in history,…
…
continue reading
Episode 138: In this episode of Critical Thinking - Bug Bounty Podcast We’re talking Caido tools and workflows. Justin gives us a list of some of the Caido tools that have caught his interest, as well as how he’s using them. Follow us on twitter at: https://x.com/ctbbpodcast Got any ideas and suggestions? Feel free to send us any feedback here: inf…
…
continue reading

1
EP14 Web3's Dark Side: Unmasking the New Age of Financial Crime
1:12:14
1:12:14
Play later
Play later
Lists
Like
Liked
1:12:14Web3 promised a new era of decentralized finance, but it has also created a new frontier for crime, with thefts and hacks far surpassing those in the traditional financial sector. In this episode, we sit down with experts Blas Kojusner, Robert Wallace, and Joseph Dobson to explore the Wild West of Web3 and decentralized finance (DeFi). But what is …
…
continue reading

1
#61 How to Level Up Fast in Your First Cybersecurity Role ft. Ryan Daub
34:47
34:47
Play later
Play later
Lists
Like
Liked
34:47In this episode of The Hacker’s Cache, returning guest Ryan Daub shares his journey from IT support to offensive security and reveals practical advice on how to level up fast in your first cybersecurity role. We cover the importance of mastering fundamentals, documenting your work, learning from failures, and asking questions without fear. Ryan als…
…
continue reading
Ken and Seth kickoff a podcast by reviewing current state of the OWASP Top 10 project, given recent requests and interactions on Absolute AppSec slack from various contributors. This is followed by an in-depth breakdown of the recent NX npm package compromise. This breakdown shows that even though AI is weaponized to exfiltrate data, the main explo…
…
continue reading

1
Canada's Cyber Cop Reveals Why AI Broke Cybercrime - Future Secured Episode 43
49:11
49:11
Play later
Play later
Lists
Like
Liked
49:11When cybercrime no longer respects borders, law enforcement must think globally too. In this episode of Future Secured, Tom Finnigan and Jason Murrell sit down with Mark Rysanek, the Cyber Liaison Officer for the Royal Canadian Mounted Police based in Sydney, Australia. Mark brings over a decade of front-line experience in cybercrime policing and n…
…
continue reading

1
Random Number Generators Pt 3: Under the Hood
23:47
23:47
Play later
Play later
Lists
Like
Liked
23:47What goes on under the hood of random number generators (RNGs)? Here we look at one of the best sources of randomness—static from electronic chips—and discuss terminology like entropy and bias, the role of the Birthday Paradox in RNGs, and the fake bias of the Excel RAND function. We'll even do a simple exercise you can try with your friends to see…
…
continue reading

1
Ep. 12 – Timing Attacks & Mobile OAuth Hijack: When Microseconds and Misflows Betray You
14:09
14:09
Play later
Play later
Lists
Like
Liked
14:09A few microseconds. One silent browser session. That’s all it took for attackers to break into systems without tripping a single alert. In this episode of Hacked & Secured: Pentest Exploits & Mitigations, we explore two subtle but devastating flaws: 🔹 Timing Attacks for Token Leaks – By measuring microsecond delays, attackers were able to recover s…
…
continue reading

1
Episode 137: How We Do AI-Assisted Whitebox Review, New CSPT Gadgets, and Tools from SLCyber
49:09
49:09
Play later
Play later
Lists
Like
Liked
49:09Episode 137: In this episode of Critical Thinking - Bug Bounty Podcast Justin Gardner and Joseph Thacker reunite to talk about AI Hacking Assistants, CSPT and cache deception, and a bunch of tools like ch.at, Slice, Ebka, and more. Follow us on twitter at: https://x.com/ctbbpodcast Got any ideas and suggestions? Feel free to send us any feedback he…
…
continue reading

1
#60 Shellcode Evasion in 2025: What Still Works (and What Doesn’t) ft. Robert O’Connor
39:55
39:55
Play later
Play later
Lists
Like
Liked
39:55In this episode of The Hacker’s Cache, Kyser Clark sits down with Red Team Consultant Robert O’Connor to unpack the realities of shellcode evasion in 2025. They dive into how antivirus and EDR solutions actually detect malicious payloads, the rise of fileless malware, and why network-level detection is still overlooked. Robert shares his hands-on e…
…
continue reading
Seth and Ken return with a new episode summarizing their experience at DEF CON 33 and all things Las Vegas over the past month. This includes panels, talks, workshops, happy hours, and even corporate (boo) events. This is followed by discussion of a few research items that came out of the conference, including James Kettle's HTTP1.1 Must Die talk. …
…
continue reading

1
Random Number Generators Pt 2: Unsecure Devices
24:25
24:25
Play later
Play later
Lists
Like
Liked
24:25Ever heard of the Internet of Things, or IoT? This episode explores the use of random numbers in our everyday devices, and how they’re often not as secure as our PCs. We also look at how Apple gets it right, and what we can do to keep our devices secure in this connected world. Resources Securing the IoT Ecosystem: Challenges & Solutions Data secur…
…
continue reading

1
#59 Q&A: You Can’t Choose Wrong in Cybersecurity
24:19
24:19
Play later
Play later
Lists
Like
Liked
24:19In this Q&A episode of The Hacker’s Cache, Kyser Clark tackles some of the biggest questions aspiring and active cybersecurity professionals ask. From whether you should stack network pentesting certs like CPTS, OSCP, and PNPT or mix in web certifications like OSWA and CBBH, to why you really can’t choose wrong in cybersecurity as long as you keep …
…
continue reading

1
Episode 136: Hacking Cluely, AI Prod Sec, and How To Not Get Sued with Jack Cable
50:53
50:53
Play later
Play later
Lists
Like
Liked
50:53Episode 136: In this episode of Critical Thinking - Bug Bounty Podcast, Joseph Thacker sits down with Jack Cable to get the scoop on a significant bug in Cluely’s desktop application, as well as the resulting drama. They also talk about Jack’s background in government cybersecurity initiatives, and the legal risks faced by security researchers. Fol…
…
continue reading

1
#58 Why Attention Is the Real Currency in Cybersecurity ft. Tadi
38:41
38:41
Play later
Play later
Lists
Like
Liked
38:41In this episode of The Hacker’s Cache, I sit down with penetration tester Tadi Kandango to unpack why attention is the real currency in cybersecurity. We talk about how he broke into pentesting without a degree, the role certifications actually play, and why sharing your work publicly can open more doors than quietly grinding in the background. Whe…
…
continue reading
Just in time for AppSec sweeps week, Anshuman Bhartiya is joining Seth Law (sethlaw on social media) and Ken Johnson (cktricky) on the Absolute AppSec podcast! With over a decade in the security industry, Anshuman Bhartiya brings a wealth of knowledge to the table, in web application penetration testing and product security for major enterprises (E…
…
continue reading

1
Random Number Generators Pt 1: Cheating at Video Games
23:26
23:26
Play later
Play later
Lists
Like
Liked
23:26This episode explores the mysterious world of random number generators (RNGs) in video games. Looking at popular games like Minecraft, Stardew Valley, and Diablo II, we describe how players hack these random numbers in the same ways hackers hack encryption keys. This episode lays the groundwork for Part 2, a discussion of RNGs in encryption. Resour…
…
continue reading

1
Security Metrics, Detection & Response & Paintball with Erik Bloch
28:15
28:15
Play later
Play later
Lists
Like
Liked
28:15🔐 Erik Bloch on his path from military hacker to Illumio security leader. Eden Naftali and Amitai sat down with Erik Bloch & here's what they covered 👇 How starting in the military shaped Erik's approach to security Building and scaling cloud detection & response teams Converting security metrics into actionable business KPIs…
…
continue reading

1
Ep. 59: WiFi Pineapple Unboxing: The Hacker Device From TV Shows!
10:58
10:58
Play later
Play later
Lists
Like
Liked
10:58Ever wondered what that mysterious "WiFi Pineapple" device from hacker movies actually does? Today we're unboxing the Hak5 WiFi Pineapple Mark 7 - the real penetration testing tool that's been featured in countless TV shows and movies! 🔥 What We Cover: Complete unboxing of the WiFi Pineapple Mark 7 How hackers use this for man-in-the-middle attack …
…
continue reading

1
#57 The AI Security Threat No One Sees Coming ft. Dino Dunn
38:40
38:40
Play later
Play later
Lists
Like
Liked
38:40In this episode of The Hacker’s Cache, Kyser Clark sits down with Dino Dunn, an AI security professional and cybersecurity instructor, to uncover the hidden risks most organizations overlook when adopting large language models and AI tools. From overlooked governance issues to the dangers of Retrieval Augmented Generation (RAG) and even how comprom…
…
continue reading

1
Episode 135: Akamai's Ryan Barnett on WAFs, Unicode Confusables, and Triage Stories
1:26:21
1:26:21
Play later
Play later
Lists
Like
Liked
1:26:21Episode 135: In this episode of Critical Thinking - Bug Bounty Podcast Justin sits down with Ryan Barnett for a deep dive on WAFs. We also recap his Exploiting Unicode Normalization talk from DEFCON, and get his perspective on bug hunting from his time at Akamai. Follow us on twitter at: https://x.com/ctbbpodcast Got any ideas and suggestions? Feel…
…
continue reading

1
#56 Beyond Certs: The Skills That Actually Matter in Pentesting ft. Nick Aures
37:11
37:11
Play later
Play later
Lists
Like
Liked
37:11In this episode of The Hacker’s Cache, senior penetration tester and red teamer Nick Aures shares the skills and habits that matter most in pentesting beyond certifications. We discuss real-world experiences from breaking into the field to finding critical vulnerabilities in companies like Tesla, USAA, and Asana. Nick reveals why strong communicati…
…
continue reading

1
EP13 Beyond the Bug: Scaling Bug Bounty Programs & Launching a Cyber Startup with Dr. Jared DeMott
37:15
37:15
Play later
Play later
Lists
Like
Liked
37:15In this episode of Behind the Binary, we sit down with Dr. Jared DeMott to pull back the curtain on the world of cybersecurity. Formerly with the Microsoft Security Response Center (MSRC), Jared shares invaluable wisdom on managing bug bounty programs at scale and what truly makes a good bug report. We then pivot to explore his fascinating career j…
…
continue reading
Need cash quick? Why not try a payday loan? While it might look like a better option than a credit card on its surface, the truth is that payday loans can be rather ugly and expensive, and can trap you in a cycle of debt if you don't know how it works. Find out how some states and countries keep a lid on exploding fees for short-term loans, and why…
…
continue reading
New season, new theme music—and even more hacks and scams to explore. Thanks for coming on these adventures with me. Let's do some more! Send us a text Support the show Join our Patreon to listen ad-free!By Many Worlds Productions
…
continue reading

1
Ep. 58: Travel Router Unboxing: Don't Get Hacked on Vacation!
14:11
14:11
Play later
Play later
Lists
Like
Liked
14:11Back in Episode 54 we talked about vacation cybersecurity, including the dangers of hotel WiFi and public networks. Today we're unboxing the travel router that could save your digital life while traveling (or at least save you a lot of grief). 🚨 Why You NEED This: Hotel WiFi is a hacker's playground. From man-in-the-middle attacks to data theft, pu…
…
continue reading

1
Episode 134: XBOW - AI Hacking Agent and Human in the Loop with Diego Djurado
1:53:35
1:53:35
Play later
Play later
Lists
Like
Liked
1:53:35Episode 134: In this episode of Critical Thinking - Bug Bounty Podcast we’re joined by Diego Djurado to give us the scoop on XBOW. We cover a little about its architecture and approach to hunting, the challenges with hallucinations, and the future of AI in the BB landscape. Diego also shares some of his own hacking journey and successes in the Amba…
…
continue reading

1
#55 Do Cybersecurity Certifications Really Get You Hired in 2025?
26:07
26:07
Play later
Play later
Lists
Like
Liked
26:07Are cybersecurity certifications still worth it in 2025? Or are they just expensive pieces of paper with no real impact on your job prospects? In this solo episode, Kyser Clark cuts through the noise and tackles the growing wave of anti-certification advice circulating online. He shares what he's actually seeing in the job market, why certification…
…
continue reading

1
Adversary Emulation, Cyber Education & Community Building with Day Johnson
28:53
28:53
Play later
Play later
Lists
Like
Liked
28:53🚨 How do you build a 4,000+ strong student-tech community from scratch?Eden Naftali and Amitai sat down with Day Johnson, Security Engineer at @amazon , ex-Datadog, founder of CyberWox Academy.What they covered 👇- Detection engineering that works at scale- What breaks IR processes (and how to fix them)- Real talk on breaking into security without s…
…
continue reading

1
Episode 133: Building Hacker Communities - Bug Bounty Village, getDisclosed, and the LHE Squad
1:16:12
1:16:12
Play later
Play later
Lists
Like
Liked
1:16:12Episode 133: In this episode of Critical Thinking - Bug Bounty Podcast we’re joined by Harley and Ari from H1 to talk some about community management roles within Bug Bounty, as well as discuss the evolution of Bug Bounty Village at DEFCON, and what they’ve got in store this year. Follow us on twitter at: https://x.com/ctbbpodcast Got any ideas and…
…
continue reading
Spurred by a recent article from Venture in Security, this episode delves deep into the practical application of security into an organization's SDLC. Covering a range of issues from gaps in contextual understanding to disingenuous vendor claims, Seth and Ken share their experiences dealing with small and large organizations with varying levels of …
…
continue reading

1
Summer 2025 Tour of Scams: Job Scams, Sextortion, and Threats
23:41
23:41
Play later
Play later
Lists
Like
Liked
23:41Scammers are still at it, happy to ruin our lives in search of a quick buck. Let's look at job scams that attempt to steal personal information, sextortion scams preying on teenage boys, and a really nasty threatening email I personally received. Know your scams, so you can keep yourself safe. Resources: These teenage boys were blackmailed online –…
…
continue reading

1
#54 Offensive Security for Blue Teamers: Why Red Team Knowledge Changes Everything ft. Josh Ragland
37:51
37:51
Play later
Play later
Lists
Like
Liked
37:51In this episode of The Hacker’s Cache, returning guest Josh Ragland shares how offensive security skills give blue teamers a serious edge. From building a hash-cracking rig to diving deep into C programming and assembly, Josh explains how understanding the attacker’s mindset can drastically cut triage time and help defenders spot threats others mis…
…
continue reading