Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Bug Bounty Podcasts

show episodes
 
Artwork

1
The Hacker's Cache

Kyser Clark - Cybersecurity

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
The show that decrypts the secrets of offensive cybersecurity, one byte at a time. Every week I invite you into the world of ethical hacking by interviewing leading offensive security practitioners. If you are a penetration tester, bug bounty hunter, red teamer, or blue teamer who wants to better understand the modern hacker mindset, whether you are new or experienced, this show is for you.
  continue reading
 
Artwork

1
The Cyber Riddler

Ahmad Almorabea

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Cyber Riddler is a podcast that discusses interesting topics in the field of information security. It explores different areas and situations in real-life cyber security engagements and activities. Episodes feature guests from different backgrounds such as hackers, security analysts, cyber security managers, bug bounty hobbyists and more.
  continue reading
 
Welcome to the Bug Hunter Podcast by Pentesterland, a podcast for pentesters & bug bounty hunters. We tackle technical questions & inspirational topics to help you develop both a hacker skillset & mindset.
  continue reading
 
Artwork

1
Behind The Bounty

Ben Sadeghipour & Nathanial Lattimer

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
Behind The Bounty gives you an inside look at the community and people that make bug bounties happen. Hosted by Ben Sadeghipour (NahamSec) and Nathanial Lattimer (d0nut).
  continue reading
 
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, develop ...
  continue reading
 
Welcome to "Crying Out Cloud," the monthly podcast that keeps you up to date with the latest cloud security news. Hosted by experts Eden Naftali and Amitai Cohen, each episode provides in-depth coverage of the most important vulnerabilities and incidents from the previous month. Tune in for insightful analysis and expert recommendations to help you safeguard your cloud infrastructure.
  continue reading
 
Artwork

1
Security Cocktail Hour

Joe Patti and Adam Roth

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Security veterans Joe Patti and Adam Roth share cyber security insights from their virtual bar stools. Join Joe and Adam, along with a diverse lineup of industry insiders, for a view into how the professionals see the security issues that impact all of us. Tune in for engaging discussions, expert analyses, and a behind-the-scenes look into the cybersecurity world. Reach us at [email protected] or @SecCocktailHour on Twitter.
  continue reading
 
Artwork
 
Hack for Fun and Profit is a weekly podcast for anyone who is interested in ethical hacking. The topics include bug bounty hunting, penetration testing, red teaming and many more. Sit back and enjoy stories, tips and tricks that will inspire you. For subscription-only episodes, enroll using this link: https://anchor.fm/thehackerish/subscribe
  continue reading
 
Future Secured brings you in-depth conversations with Australian and global cyber security leaders, founders, CEOs, and co-founders. Hosted by Jason Murell and Tom Finnigan, each episode delves into the personal journeys of these experts as they navigate the challenges of building and scaling successful cyber security businesses. From critical industry issues to hard-learned lessons, the podcast explores the competitive global market and offers valuable insights on how to start, grow, and su ...
  continue reading
 
Welcome to Behind the Binary, the podcast that introduces you to the fascinating people, technology, and tools driving the world of reverse engineering. Join your host, Josh Stroschein, a reverse engineer with the FLARE team at Google, and someone passionate about sharing knowledge and shedding light on the art of reverse engineering, as he sits down with intriguing guests to explore the human side of this profession. Behind the Binary goes beyond the code, sharing the stories, motivations, ...
  continue reading
 
Artwork

1
Hacker Talk

Firo Solutions LTD

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Hacker Talk brings you interesting conversation between some of the world best hackers, cyber security professionals and information security people.
  continue reading
 
In "Surfacing Security," we explore a variety of cybersecurity topics relevant to Attack Surface Management and beyond. Your co-hosts are Michael Gianarakis (Assetnote Co-Founder/CEO) and Shubham Shah (Assetnote Co-Founder/CTO).
  continue reading
 
Artwork

1
BizSec Podcast

bizsecpodcast.com

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Business Security (BizSec) Podcast. Hosts Beau Woods and Dave Kennedy analyze and discuss the latest business news in the information and technology security world, as well as a bigger picture theme each episode. Follow us @bizsecpodcast
  continue reading
 
Building better software, one incident at a time. Host Kevin Riggle talks with software engineers about that time they broke production. Whether you're an industry professional, or just curious about what makes the modern Internet run and what happens when it breaks, we bring you stories you haven't heard elsewhere. This is the audio version of the podcast. Watch on YouTube: https://youtube.com/@critical-point Produced by Complex Systems Group (https://complexsystems.group). Part of Critical ...
  continue reading
 
An insanely enjoyable Bitcoin podcast with a strong focus on liberty. Every Thursday, we chat about how Bitcoin sets the world free and share the latest cryptocurrency news and general Bitcoin talk. Guests have included: - Mastering Bitcoin author Andreas Antonopoulos - Liberty.me CLO Jeffrey Tucker - Antiwar.com editor Angela Keaton - Bitcoin/liberty activist Michele Seven - Jason King from Sean's Outpost Homeless Outreach - Drew Phillips from Bitcoin Not Bombs - Numerous other Bitcoin-lovi ...
  continue reading
 
Loading …
show series
 
Episode 141: In this episode of Critical Thinking - Bug Bounty Podcast Justin sits down with Nick Copi to talk about CSPT, React, CSS Injections and how Nick hacked the pod. Follow us on twitter at: https://x.com/ctbbpodcast Got any ideas and suggestions? Feel free to send us any feedback here: [email protected] Shoutout to YTCracker …
  continue reading
 
The finale of HBO's Silicon Valley series pointed up a subtle parallel to the real-world challenges in vulnerability reporting—rather than risk going to jail, Pied Piper chose to burn the company to the ground. For decades, white hat and gray hat hackers had no place to report cybersecurity flaws without fear of legal hassles. Nowadays we have Bug …
  continue reading
 
Forbes 30 Under 30 cybersecurity expert Yevheniia Broshevan discusses crypto security challenges, bug bounty programs, and the reality that 95% of Bitcoin has been mined while 11-18% is lost forever. 🔥 What You'll Learn: The concerning trend in crypto losses hitting $3 billion this year alone How bug bounties in Web3 can reach up to $10 million for…
  continue reading
 
Senior penetration tester Vladimir Ichkov shares what really matters in cybersecurity job interviews from the perspective of both a candidate and an interviewer. We discuss the role of soft skills, confidence, and humor in landing a pentesting job, common red flags that turn interviewers away, and how technical experience as a system administrator …
  continue reading
 
Everyone's using AI, including ransomware gangs. Podcast guest Karin Lagziel, Director Cybersecurity at consulting firm Sygnia, gives us the news and her cyber defense strategies for fighting back: With more AI, as well as a focus on fundamentals. In this episode: 🔹 The first AI-powered ransomware "Prompt Lock" discovered in the wild 🔹 How Chinese …
  continue reading
 
There's a new scam going around, where a thief gets you to unlock your phone under the guise of needing to make a call, then runs off with the phone and sends themselves all your money through your apps. Learn how to protect yourself and your money with a simple smartphone trick for iPhone and Android. Send us a text Support the show Join our Patre…
  continue reading
 
Dive into the hidden world of Windows Event Logs — where SOC analysts uncover patterns, trace intrusions, and expose how attackers exploit the very logs meant to catch them. Learn how to spot the signals, build timelines, and stay one step ahead of the breach. X: @almorabea X: @CyberRiddler Website: https://thecyberriddler.com…
  continue reading
 
Episode 140: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joseph give an update from The Crit Research Lab, as well as some writeups on postMessage vulnerabilities, Cookie Chaos, and more. Follow us on X at: https://x.com/ctbbpodcast Got any ideas and suggestions? Send us feedback at [email protected] Shoutout …
  continue reading
 
In this episode, we're "Getting Ready for FLARE-On 12" with an inside look at the world-renowned reverse engineering competition. We’re joined by long-time FLARE-On host and challenge author Nick Harbour and regular challenge author Blas Kojusner for an in-depth conversation. We'll take a brief tour of FLARE-On history and discuss how it has grown …
  continue reading
 
Breaking into cybersecurity isn’t about being “good enough.” It’s about outworking the 1,000 other applicants fighting for the same job. In this episode of The Hacker’s Cache podcast, I share the raw truth about competing in today’s cybersecurity job market, why certifications and hands-on projects matter more than ever, and how to stand out when e…
  continue reading
 
In what is (sadly) becoming a weekly segment, this episode starts with talk of the latest installment of npm package takeovers, dubbed Shai Hulud as discussed in Slack and analyzed by Paul McCarty and team. Strategies discussed for monitoring packages and preventing malware from entering into organization's products. This is followed by an article …
  continue reading
 
🚨 The kernel-level security revolution you can't ignore — a must-listen with Liz Rice Eden Naftali and Amitai sit down with Liz Rice, Chief Open Source Officer at Isovalent (Cisco), and a global expert in eBPF, containers, and Kubernetes security. 🎙️ In this episode: How eBPF is reshaping cloud security from the ground up Practical strategies to ta…
  continue reading
 
What does a world without passwords actually look like and how close are we? In this episode of Future Secured, Karim Toubba, CEO of LastPass, explores the shifting future of password management, identity security and user authentication in an era defined by AI, Shadow IT and cloud-first business models. With over 25 years in cybersecurity leadersh…
  continue reading
 
Episode 139: In this episode of Critical Thinking - Bug Bounty Podcast Justin finally sits down with the great James Kettle to talk about HTTP Proxys, metagaming research, avoiding burnout, and why HTTP/1.1 must die! Follow us on twitter at: https://x.com/ctbbpodcast Got any ideas and suggestions? Feel free to send us any feedback here: info@critic…
  continue reading
 
In this episode of The Hacker’s Cache, Kyser Clark sits down with Carl Vincent, better known as Vyrus, to unpack the shifting realities of cybersecurity. Carl shares straight talk on the Silver Bullet ecosystem that fraud actors rely on, why today’s cybercrime is more about account access than shell popping, and how blue teams can actually turn cri…
  continue reading
 
The Absolute AppSec duo returns with an in-depth episode talking about true and false positives, where context matters and business impact must be taken into account in order to avoid rabbit holes. This discussion spurred by a recent article from signalblur of magonia.io discussing alerts in a security operations center. In short, only considering …
  continue reading
 
In this episode, Liz Morton, Field CISO at Axonius, shares her 25-year journey through IT and cybersecurity, including nearly a decade at the Intercontinental Exchange that looks after the New York Stock Exchange. She discusses the transition from practitioner to Field CISO, the persistent challenges of visibility and asset management and the reali…
  continue reading
 
What is Red Teaming, and what does it have to do with cybersecurity? In this episode, we look at how Red Teamers are hired to attack company security using all manner of tactics, from tossing malware-infested USB sticks into parking lots to posing as an HVAC technician. We also take a look at one of the most notorious Red Team exercises in history,…
  continue reading
 
Episode 138: In this episode of Critical Thinking - Bug Bounty Podcast We’re talking Caido tools and workflows. Justin gives us a list of some of the Caido tools that have caught his interest, as well as how he’s using them. Follow us on twitter at: https://x.com/ctbbpodcast Got any ideas and suggestions? Feel free to send us any feedback here: inf…
  continue reading
 
Web3 promised a new era of decentralized finance, but it has also created a new frontier for crime, with thefts and hacks far surpassing those in the traditional financial sector. In this episode, we sit down with experts Blas Kojusner, Robert Wallace, and Joseph Dobson to explore the Wild West of Web3 and decentralized finance (DeFi). But what is …
  continue reading
 
In this episode of The Hacker’s Cache, returning guest Ryan Daub shares his journey from IT support to offensive security and reveals practical advice on how to level up fast in your first cybersecurity role. We cover the importance of mastering fundamentals, documenting your work, learning from failures, and asking questions without fear. Ryan als…
  continue reading
 
Ken and Seth kickoff a podcast by reviewing current state of the OWASP Top 10 project, given recent requests and interactions on Absolute AppSec slack from various contributors. This is followed by an in-depth breakdown of the recent NX npm package compromise. This breakdown shows that even though AI is weaponized to exfiltrate data, the main explo…
  continue reading
 
When cybercrime no longer respects borders, law enforcement must think globally too. In this episode of Future Secured, Tom Finnigan and Jason Murrell sit down with Mark Rysanek, the Cyber Liaison Officer for the Royal Canadian Mounted Police based in Sydney, Australia. Mark brings over a decade of front-line experience in cybercrime policing and n…
  continue reading
 
What goes on under the hood of random number generators (RNGs)? Here we look at one of the best sources of randomness—static from electronic chips—and discuss terminology like entropy and bias, the role of the Birthday Paradox in RNGs, and the fake bias of the Excel RAND function. We'll even do a simple exercise you can try with your friends to see…
  continue reading
 
A few microseconds. One silent browser session. That’s all it took for attackers to break into systems without tripping a single alert. In this episode of Hacked & Secured: Pentest Exploits & Mitigations, we explore two subtle but devastating flaws: 🔹 Timing Attacks for Token Leaks – By measuring microsecond delays, attackers were able to recover s…
  continue reading
 
Episode 137: In this episode of Critical Thinking - Bug Bounty Podcast Justin Gardner and Joseph Thacker reunite to talk about AI Hacking Assistants, CSPT and cache deception, and a bunch of tools like ch.at, Slice, Ebka, and more. Follow us on twitter at: https://x.com/ctbbpodcast Got any ideas and suggestions? Feel free to send us any feedback he…
  continue reading
 
In this episode of The Hacker’s Cache, Kyser Clark sits down with Red Team Consultant Robert O’Connor to unpack the realities of shellcode evasion in 2025. They dive into how antivirus and EDR solutions actually detect malicious payloads, the rise of fileless malware, and why network-level detection is still overlooked. Robert shares his hands-on e…
  continue reading
 
Seth and Ken return with a new episode summarizing their experience at DEF CON 33 and all things Las Vegas over the past month. This includes panels, talks, workshops, happy hours, and even corporate (boo) events. This is followed by discussion of a few research items that came out of the conference, including James Kettle's HTTP1.1 Must Die talk. …
  continue reading
 
Ever heard of the Internet of Things, or IoT? This episode explores the use of random numbers in our everyday devices, and how they’re often not as secure as our PCs. We also look at how Apple gets it right, and what we can do to keep our devices secure in this connected world. Resources Securing the IoT Ecosystem: Challenges & Solutions Data secur…
  continue reading
 
In this Q&A episode of The Hacker’s Cache, Kyser Clark tackles some of the biggest questions aspiring and active cybersecurity professionals ask. From whether you should stack network pentesting certs like CPTS, OSCP, and PNPT or mix in web certifications like OSWA and CBBH, to why you really can’t choose wrong in cybersecurity as long as you keep …
  continue reading
 
Episode 136: In this episode of Critical Thinking - Bug Bounty Podcast, Joseph Thacker sits down with Jack Cable to get the scoop on a significant bug in Cluely’s desktop application, as well as the resulting drama. They also talk about Jack’s background in government cybersecurity initiatives, and the legal risks faced by security researchers. Fol…
  continue reading
 
In this episode of The Hacker’s Cache, I sit down with penetration tester Tadi Kandango to unpack why attention is the real currency in cybersecurity. We talk about how he broke into pentesting without a degree, the role certifications actually play, and why sharing your work publicly can open more doors than quietly grinding in the background. Whe…
  continue reading
 
Just in time for AppSec sweeps week, Anshuman Bhartiya is joining Seth Law (sethlaw on social media) and Ken Johnson (cktricky) on the Absolute AppSec podcast! With over a decade in the security industry, Anshuman Bhartiya brings a wealth of knowledge to the table, in web application penetration testing and product security for major enterprises (E…
  continue reading
 
This episode explores the mysterious world of random number generators (RNGs) in video games. Looking at popular games like Minecraft, Stardew Valley, and Diablo II, we describe how players hack these random numbers in the same ways hackers hack encryption keys. This episode lays the groundwork for Part 2, a discussion of RNGs in encryption. Resour…
  continue reading
 
🔐 Erik Bloch on his path from military hacker to Illumio security leader. Eden Naftali and Amitai sat down with Erik Bloch & here's what they covered 👇 How starting in the military shaped Erik's approach to security Building and scaling cloud detection & response teams Converting security metrics into actionable business KPIs…
  continue reading
 
Ever wondered what that mysterious "WiFi Pineapple" device from hacker movies actually does? Today we're unboxing the Hak5 WiFi Pineapple Mark 7 - the real penetration testing tool that's been featured in countless TV shows and movies! 🔥 What We Cover: Complete unboxing of the WiFi Pineapple Mark 7 How hackers use this for man-in-the-middle attack …
  continue reading
 
In this episode of The Hacker’s Cache, Kyser Clark sits down with Dino Dunn, an AI security professional and cybersecurity instructor, to uncover the hidden risks most organizations overlook when adopting large language models and AI tools. From overlooked governance issues to the dangers of Retrieval Augmented Generation (RAG) and even how comprom…
  continue reading
 
Episode 135: In this episode of Critical Thinking - Bug Bounty Podcast Justin sits down with Ryan Barnett for a deep dive on WAFs. We also recap his Exploiting Unicode Normalization talk from DEFCON, and get his perspective on bug hunting from his time at Akamai. Follow us on twitter at: https://x.com/ctbbpodcast Got any ideas and suggestions? Feel…
  continue reading
 
In this episode of The Hacker’s Cache, senior penetration tester and red teamer Nick Aures shares the skills and habits that matter most in pentesting beyond certifications. We discuss real-world experiences from breaking into the field to finding critical vulnerabilities in companies like Tesla, USAA, and Asana. Nick reveals why strong communicati…
  continue reading
 
In this episode of Behind the Binary, we sit down with Dr. Jared DeMott to pull back the curtain on the world of cybersecurity. Formerly with the Microsoft Security Response Center (MSRC), Jared shares invaluable wisdom on managing bug bounty programs at scale and what truly makes a good bug report. We then pivot to explore his fascinating career j…
  continue reading
 
Need cash quick? Why not try a payday loan? While it might look like a better option than a credit card on its surface, the truth is that payday loans can be rather ugly and expensive, and can trap you in a cycle of debt if you don't know how it works. Find out how some states and countries keep a lid on exploding fees for short-term loans, and why…
  continue reading
 
Back in Episode 54 we talked about vacation cybersecurity, including the dangers of hotel WiFi and public networks. Today we're unboxing the travel router that could save your digital life while traveling (or at least save you a lot of grief). 🚨 Why You NEED This: Hotel WiFi is a hacker's playground. From man-in-the-middle attacks to data theft, pu…
  continue reading
 
Episode 134: In this episode of Critical Thinking - Bug Bounty Podcast we’re joined by Diego Djurado to give us the scoop on XBOW. We cover a little about its architecture and approach to hunting, the challenges with hallucinations, and the future of AI in the BB landscape. Diego also shares some of his own hacking journey and successes in the Amba…
  continue reading
 
Are cybersecurity certifications still worth it in 2025? Or are they just expensive pieces of paper with no real impact on your job prospects? In this solo episode, Kyser Clark cuts through the noise and tackles the growing wave of anti-certification advice circulating online. He shares what he's actually seeing in the job market, why certification…
  continue reading
 
🚨 How do you build a 4,000+ strong student-tech community from scratch?Eden Naftali and Amitai sat down with Day Johnson, Security Engineer at @amazon , ex-Datadog, founder of CyberWox Academy.What they covered 👇- Detection engineering that works at scale- What breaks IR processes (and how to fix them)- Real talk on breaking into security without s…
  continue reading
 
Episode 133: In this episode of Critical Thinking - Bug Bounty Podcast we’re joined by Harley and Ari from H1 to talk some about community management roles within Bug Bounty, as well as discuss the evolution of Bug Bounty Village at DEFCON, and what they’ve got in store this year. Follow us on twitter at: https://x.com/ctbbpodcast Got any ideas and…
  continue reading
 
Spurred by a recent article from Venture in Security, this episode delves deep into the practical application of security into an organization's SDLC. Covering a range of issues from gaps in contextual understanding to disingenuous vendor claims, Seth and Ken share their experiences dealing with small and large organizations with varying levels of …
  continue reading
 
Scammers are still at it, happy to ruin our lives in search of a quick buck. Let's look at job scams that attempt to steal personal information, sextortion scams preying on teenage boys, and a really nasty threatening email I personally received. Know your scams, so you can keep yourself safe. Resources: These teenage boys were blackmailed online –…
  continue reading
 
In this episode of The Hacker’s Cache, returning guest Josh Ragland shares how offensive security skills give blue teamers a serious edge. From building a hash-cracking rig to diving deep into C programming and assembly, Josh explains how understanding the attacker’s mindset can drastically cut triage time and help defenders spot threats others mis…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play