Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
show episodes
 
As cars become smarter and more connected, the demand for top-tier automotive cyber security has never been higher. With expert insights from PlaxidityX, a leading automotive cyber security company, we’ll guide you through the challenges and solutions protecting millions of vehicles worldwide. Whether you’re an industry expert or just curious about how cars are secured in the digital age, this podcast comprehensively looks at how cyber defenses are developed, tested, and deployed. We don’t j ...
  continue reading
 
Artwork

1
You Gotta Hack That

You Gotta Hack That

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Felix takes a weekly look at Internet of Things (IoT) cyber security. Perfect for IoT project managers, developers, and those learning about penetration testing in this niche area. Email Felix using [email protected] Find You Gotta Hack That on Twitter @gotta_hack yougottahackthat.com
  continue reading
 
Artwork
 
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
  continue reading
 
Artwork

1
SpyCast

SpyCast

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
SpyCast, the official podcast of the International Spy Museum, is a journey into the shadows of international espionage. Each week, host Sasha Ingber brings you the latest insights and intriguing tales from spies, secret agents, and covert communicators, with a focus on how this secret world reaches us all in our everyday lives. Tune in to discover the critical role intelligence has played throughout history and today. Brought to you from Airwave, Goat Rodeo, and the International Spy Museum ...
  continue reading
 
Loading …
show series
 
With next-generation vehicles rapidly transforming into software-defined platforms powered by High-Performance Computers (HPCs), the approach to automotive security is fundamentally changing. These powerful central processors are critical for everything from infotainment to autonomous driving, but their consolidation also creates a significant sing…
  continue reading
 
How do you catch an enemy’s submarine … and then make it vanish? That’s what the U.S. Navy’s elusive Tenth Fleet planned, as it tracked down Germany’s U-505 submarine. The mission came right before the Allies ran ashore on the beaches of Normandy in World War II. Historian Alexander Rose draws on long classified documents and intercepted transmissi…
  continue reading
 
Most Americans would agree that the United States should be protected, but from whom … and how? Dr. Donell Harvin, the former Chief of Homeland Security and Intelligence for the District of Columbia, says the U.S. is taking its eye off the ball - focusing its large domestic intelligence apparatus in a direction that is politically expedient, but no…
  continue reading
 
After Russia’s full scale invasion of Ukraine, the U.S. rushed to create a secret center that set targets for the Ukrainians to destroy. But the counteroffensive of 2023 failed to achieve its goals. So, what went wrong? New York Times reporter Adam Entous spent more than a year reporting on this story. He joins SpyCast host Sasha Ingber to talk abo…
  continue reading
 
Conflict has been escalating between two nuclear powers–India and Pakistan. It started in April, after India blamed Pakistan for supporting militants who carried out a massacre in Kashmir. President Trump offered to help defuse the tensions.Throughout history, India and Pakistan’s hostility has been documented in the President's Daily Brief, a high…
  continue reading
 
In this episode, Felix and Alex discuss the alarming rise of phone thefts in London, sharing personal anecdotes and insights into the implications of losing a device. They explore security measures, user behaviors, and the broader impact of identity theft in today's digital age. The conversation emphasizes the importance of enhancing phone security…
  continue reading
 
They were a spy cell like no other — operating from quiet British suburbs, hailing from Bulgaria, and working on behalf of Russia. Their handler dubbed them “The Minions,” and their plots stretched across Europe and spanned honeytraps, abductions, and murder. At the time of this recording, six have been convicted and await sentencing. To parse out …
  continue reading
 
The United States and Ukraine have had a long, complicated history that has been defined by just as much partnership and collaboration as hesitation and disagreement. This dynamic is laid bare in the 7-part podcast series ‘Escalation,’ produced by our partners at Goat Rodeo, with the national security publication Lawfare. In April 2025, The Interna…
  continue reading
 
Why does Vladimir Putin often say that the West is conspiring to weaken Russia? Historian James Crossland traces this narrative back to a British intelligence officer and a failed assassination attempt on Vladimir Lenin in 1918. The story is featured in his new book, Rogue Agent, from Secret Plots to Psychological Warfare, the Untold Story of Rober…
  continue reading
 
With cyber attacks on trucks becoming more common and costly, fleet operators and OEMs must rethink how they protect their vehicle security and data privacy. Trucks are no longer isolated units, they're part of a larger, interconnected automotive ecosystem vulnerable to disruption. In this episode, we unpack the threats, explore real-world hacking …
  continue reading
 
In this conversation, Felix and Oli discuss the development of a hydrogen-powered uncrewed surface vessel (USV) and the associated cybersecurity challenges. They explore the importance of integrating cybersecurity measures from the outset, navigating regulatory frameworks like Workboat Code 3, and the ongoing challenges of ensuring compliance and s…
  continue reading
 
Government employees were dismissed with startling swiftness and sweeping in the midst of the Trump administration's relentless pursuit to pare down the federal workforce. The sheer number of fired personnel and the manner in which US officials let them go have led to concerns that disillusioned former employees may share what they know with foreig…
  continue reading
 
In this episode, we explore the shift from traditional theft to a new era of digital car theft. Instead of smashing windows, today’s criminals launch automotive cyber-attacks that bypass immobilizers, unlock doors, and hijack control systems, all without leaving a trace. From CAN bus vulnerabilities to cloned key fobs, cybercriminals are finding ne…
  continue reading
 
It's no secret that China has recently stepped up political and military pressure on the democratically governed island of Taiwan. But then, there are the Chinese Communist Party's covert efforts: Recruiting from the inside, gathering intelligence, and exerting influence. Executive Director of the Global Taiwan Institute Russell Hsiao breaks down B…
  continue reading
 
Targeted uncovers harrowing stories of people who have been singled out and systematically dismantled—whether for political reasons, personal vendettas, or simply for being in the wrong place at the wrong time. Each episode deep dives into the tactics used against someone, the devastating consequences, and the remarkable lessons they’ve learned in …
  continue reading
 
Nicholas Eftimiades’ 34 year career in government spanned the CIA, State Department and the Defense Intelligence Agency. He's published three books that examine the structure, methodology and operations of China's intelligence services. This, he says, led a Chinese communist newspaper to declare him an enemy of the state in the ‘90s. Now, Nick is r…
  continue reading
 
Sidney Gottlieb was one of the CIA’s star chemists during the Cold War. As head of MKUltra, he ran a brazen—and deadly—program aimed at mind control. Gottlieb and fellow scientists tried to keep the work secret by destroying files, but historian John Lisle has new details from the six boxes that remained untouched. He shares insights and reflection…
  continue reading
 
Valerie Plame’s clandestine life made headlines in 2003 after her CIA cover was leaked to the press. Her husband, an ambassador, had gone to Niger to investigate whether yellowcake uranium had been transferred to Iraq to make weapons of mass destruction. He publicly challenged the Bush administration on what we now know was false intelligence. Vale…
  continue reading
 
After the Taliban took back control of Afghanistan, the National Resistance Front rose up to defy them. We spoke with their leader Ahmad Massoud, who has overseen hundreds of military and intelligence-gathering operations. He’s following the footsteps of his father, who led his own resistance group, the Northern Alliance, until members of Al Qaeda …
  continue reading
 
In this episode, we discuss the groundbreaking concept of Dynamic SBOM and its role in modern automotive software security. Hear how real-time monitoring of third-party library usage can lead to more precise vulnerability management. We explain the process behind intercepting dynamic calls and replacing them with breakpoints for live analysis. Disc…
  continue reading
 
He was an American spy before an American spy agency existed. NFL player Ernest Cuneo, a little known first generation Italian American, worked with British intelligence to convince the United States to join World War II, and helped lay the groundwork for modern day espionage. Thomas Maier traces Cuneo’s extraordinary life in his new book, The Invi…
  continue reading
 
A fourth year of war in Ukraine begins. But for Lt. Col. Kyrylo Berkal, who’s been fighting since Russia first invaded in 2014, the battle for his country has raged much longer. Now, he’s second in command of the elite Third Assault Brigade, which has played a major role in critical battles against Russia and continues to develop new technologies t…
  continue reading
 
In the age of connected cars, software-driven systems, and global supply chains, cyber security challenges have become increasingly complex. This episode delves into the pitfalls of relying on disconnected solutions to guard modern vehicles. We’ll show how a platform-centric automotive security approach consolidates everything—from vulnerability sc…
  continue reading
 
She’s known for helping to free people through the Underground Railroad, but Harriet Tubman was also a spy during the Civil War. And with the intelligence she collected, the Maryland native became the first woman to lead men into battle on gunboats down the Combahee River in South Carolina. The Combahee River Raid destroyed several vital Confederat…
  continue reading
 
North Korea is growing more dangerous, but no U.S. administration has been able to crack the code on its leader Kim Jong Un. Now, there’s even less incentive for Kim to negotiate because of the support he’s getting from Russia. So what will Kim do next, and where is he vulnerable? Jung H. Pak, a former CIA analyst who served as the country’s top di…
  continue reading
 
As OEMs race to innovate with autonomous driving, V2X communication, and other cutting-edge tech, compliance with UNR 155 and ISO/SAE 21434 has never been more important. But what do these regulations really mean for your day-to-day operations? In this episode, we demystify the role of CSMS and how it supports continuous security through design, de…
  continue reading
 
For decades, colleges and universities have been a destination for espionage. Especially in recent years, the use of international students and faculty as spies on American campuses has been particularly daunting. Why do intelligence services, both foreign and domestic, target colleges and universities? And what is there to gain on these campuses? …
  continue reading
 
Touted as an off-the-shelf solution for key fob programming, a mysterious PSP-like Car Key Registration Device promises to sidestep traditional authorization channels. In this episode, we share how the PlaxidityX team simulated various car responses to test whether the device truly mirrored official protocols. They recount the odd mix of user-frien…
  continue reading
 
Agent Zo was the only female Polish resistance agent to reach London as a courier during WWII and the only female member of Poland's fabled 'Silent Unseen' paratroopers. Yet despite having researched Poland's wartime resistance movement, many of us have never heard of her. Why? If you liked this episode, check out these links: Agent Zo: The Extraor…
  continue reading
 
Have you ever wondered how microcontrollers in vehicles manage memory access behind the scenes? This episode sheds light on the Memory Protection Unit, an essential yet sometimes overlooked hardware layer designed to stop unauthorized reads, writes, and execution. We revisit fundamental principles—like differentiating between the Core MPU (CMPU) an…
  continue reading
 
This episode explores AI’s transformative role in automotive cyber security. As vehicles become increasingly connected and autonomous, cyber threats have evolved, but AI provides the precision and speed needed to counter these challenges. Join us as we unpack the critical role of AI in protecting modern vehicles, from anomaly detection to sophistic…
  continue reading
 
Now that President Trump has been inaugurated, what can we expect for the intelligence community? On his first full day in his first term, he visited the CIA to voice support. But he has also displayed deep skepticism and accused spy agencies of undermining him. Beth Sanner is a highly decorated, retired career intelligence officer who briefed Trum…
  continue reading
 
Intrusion Detection System Managers (IdsM) play a vital role in modern automotive cybersecurity, addressing the challenges posed by complex security events and regulatory requirements. IdsM solutions filter and standardize event data from AUTOSAR and Linux ECUs, reducing inefficiencies in monitoring and analysis. In this episode, we will explore ho…
  continue reading
 
Former intelligence officer Bryan Stern describes the tradecraft he used on Russian intelligence and military services to rescue an American imprisoned in Russian-occupied Ukraine. If you liked this episode check out these links to more hostage rescue stories: SpyCast - James Foley: Journalist, ISIS Hostage, Son – with His Mother Diane Foley Operac…
  continue reading
 
The rise of CAN injection car theft has introduced a new level of sophistication to vehicle hacking, allowing thieves to access the CAN bus. In this episode, we discuss how this technique allows hackers to tap into the CAN bus through exposed wiring, sending fake messages that bypass security measures and immobilizers. The impact of these attacks e…
  continue reading
 
Keyless entry systems, once considered the pinnacle of vehicle convenience, are now a major target for hackers and car thieves. In today’s episode, we’ll explore the vulnerabilities in Remote and Passive Keyless Entry (RKE/PKE) systems, focusing on how replay, relay, and roll jam attacks exploit their weaknesses. We break down these attack methods,…
  continue reading
 
Introducing the new host of SpyCast, Sasha Ingber! In this week’s episode, Sasha joined Erin in a conversation about her career and the future of the International Spy Museum’s flagship podcast. Now entering it’s 19th year, SpyCast will relaunch on January 14th with brand new episodes, featuring exciting spy stories and the latest intelligence from…
  continue reading
 
Automotive cybersecurity is becoming increasingly important as electric vehicles face new vulnerabilities. In this episode, we explore a major flaw discovered in the EVerest open-source charging firmware, which could allow attackers to take control of charging stations and potentially compromise vehicles themselves. This vulnerability serves as a s…
  continue reading
 
Summary Robert Gates (Website; Website) joins Andrew (Twitter; LinkedIn) to reflect on the 75th Anniversary of the CIA. He served 8 U.S. presidents. What You’ll Learn Intelligence His reflections on the CIA at 75 How the CIA’s story intersected with his own His take on the organization’s strengths and weaknesses The complex intl. environment the CI…
  continue reading
 
Automotive networks face an alarming threat: Man-in-the-Middle (MITM) attacks exploiting the SOME/IP protocol. This episode explores how attackers intercept and manipulate communications between ECUs using in-vehicle Ethernet networks, enabling them to falsify data, disrupt services, and compromise safety. We outline the attack setup, flow, and the…
  continue reading
 
Summary Hugh Wilford joins Andrew (X; LinkedIn) to discuss his new book. Hugh is a professor, author, and leading CIA historian. What You’ll Learn Intelligence Imperial influences on American intelligence Key figures in CIA history “Wild” Bill Donovan & British influence Groton School’s impact on CIA leaders Reflections Inherited history Challengin…
  continue reading
 
In this episode, we explore how industry leaders PlaxidityX, CyberArk, Device Authority, and Microsoft have joined forces to pioneer the next generation of automotive and mobility security solutions. With new regulatory mandates like UNECE WP.29 and ISO 21434 on the horizon, the automotive industry requires a holistic approach to securing vehicles …
  continue reading
 
Summary Robert Shaw joins Andrew to discuss his experience working as an accredited Battlefield tour guide. Bob’s career in the British Army spanned over 25 years. What You’ll Learn Intelligence Becoming a battlefield tour guide IEDD and Intelligence Work in Northern Ireland Hypothetical WWIII scenarios Special Forces, TECHINT, & the Bin Laden Raid…
  continue reading
 
The motorcycle industry is facing a new challenge: automotive cybersecurity. This episode explores how UNR 155, initially designed for passenger vehicles, now includes motorcycles, scooters, and high-speed e-bikes. We’ll discuss what this regulation means, why it’s happening, and how it could reshape the two-wheeler market as manufacturers scramble…
  continue reading
 
Summary Anna Slafer (LinkedIn, Website) joins Andrew (X; LinkedIn) to discuss the history of the International Spy Museum. Anna was one of SPY’s first employees when the museum opened in 2002. What You’ll Learn Intelligence Building the International Spy Museum Milton Maltz: the visionary behind SPY The role of historians and curators Creating exhi…
  continue reading
 
Learn how PlaxidityX’s automotive expertise and Eviden’s MDR capabilities combine to create an end-to-end solution for vehicle security. This episode covers the benefits of establishing a dedicated Vehicle SOC (VSOC), an emerging necessity in the industry to monitor, detect, and respond to cyber-attacks in real time. We'll discuss the importance of…
  continue reading
 
Summary Lieutenant General Anthony Crutchfield (Ret.) (LinkedIn, Wikipedia) joins Andrew (X; LinkedIn) to discuss his time as the Deputy Commander of United States Indo-Pacific Command. PACOM covers 52% of the globe. What You’ll Learn Intelligence The role of intelligence in military operations Ethical dilemmas in command decisions Reflections on t…
  continue reading
 
The connected car and smart home ecosystems are on a collision course, bringing convenience and innovation, but also creating serious cybersecurity concerns. This episode delves into what happens when cars and homes start talking to each other, thanks to new collaborations like Samsung and Hyundai's initiative. We’ll look at the benefits, like vehi…
  continue reading
 
Summary Jonathan B. Smith (X; LinkedIn) joins Andrew (X; LinkedIn) to discuss the application of intelligence to entrepreneurship. Jonathan is an entrepreneur, author, and business strategist. What You’ll Learn Intelligence Building high-performance teams Case officers vs. entrepreneurs Networking and overcoming operational challenges Curiosity as …
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play