Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Penetration Testing Podcasts

show episodes
 
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
  continue reading
 
Artwork
 
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
  continue reading
 
Since 2005, BlueHat has been where the security research community, and Microsoft, come together as peers; to debate, discuss, share, challenge, celebrate and learn. On The BlueHat Podcast, Microsoft and MSRC’s Nic Fillingham and Wendy Zenone will host conversations with researchers and industry leaders, both inside and outside of Microsoft, working to secure the planet’s technology and create a safer world for all.
  continue reading
 
As cars become smarter and more connected, the demand for top-tier automotive cyber security has never been higher. With expert insights from PlaxidityX, a leading automotive cyber security company, we’ll guide you through the challenges and solutions protecting millions of vehicles worldwide. Whether you’re an industry expert or just curious about how cars are secured in the digital age, this podcast comprehensively looks at how cyber defenses are developed, tested, and deployed. We don’t j ...
  continue reading
 
With such countless organizations succumbing to cybercriminals attacks, organizations should go the additional mile to get internal and external web applications. Numerous organizations feel that vulnerability examines are sufficient for finding security failings in a web application. While vulnerability scans can feature known shortcomings, web application penetration testing shows you how well they would hold up in a true attack by unapproved or unauthorized clients.
  continue reading
 
Artwork
 
Engineers consistently exclude non-technical people from understanding enough about technology to better utilise it. This is wrong! Engineers should be equipping non-technical people with enough of an understanding to make the right business decisions, without trying to drag them all the way down into the detail.
  continue reading
 
Artwork

1
Hacked Off

Secarma

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Hacked Off demystifies the world of cybersecurity. Hosted by Secarma's Managing Director, Holly Grace Williams, it features weekly interviews delving beneath the headlines of the latest hacks, breaches and vulnerabilities, providing expert advice on how to stay safe online. This podcast is brought to you by global cybersecurity and penetration testing company, Secarma.
  continue reading
 
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, develop ...
  continue reading
 
Artwork

1
You Gotta Hack That

You Gotta Hack That

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Felix explores Internet of Things (IoT) and Operational Technology cyber security. Perfect for project managers, developers, and those learning about penetration testing in this niche area. Email Felix using [email protected] Get more information at the website: yougottahackthat.com Find You Gotta Hack That on LinkedIn and X @gotta_hack
  continue reading
 
My name is Alex Fergus, and I'm a health and technology geek providing in-depth, independent product reviews on the latest red light therapy devices. With over seven years of experience studying light therapy and having used and tested dozens of hundreds of light therapy products, you can be sure that I'll have a video to help you with your educational or product-buying needs. Test, review, compare, and study all things Red Light Therapy. Whether you're seeking out the best Red Light Body Pa ...
  continue reading
 
Artwork
 
Hack for Fun and Profit is a weekly podcast for anyone who is interested in ethical hacking. The topics include bug bounty hunting, penetration testing, red teaming and many more. Sit back and enjoy stories, tips and tricks that will inspire you. For subscription-only episodes, enroll using this link: https://anchor.fm/thehackerish/subscribe
  continue reading
 
Artwork

1
We think we know

Pentest-Tools.com

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
We think we know how computer systems work, but how come they keep surprising us? We also think we know how humans behave, but we keep finding out we don’t. This podcast is for ethical hackers who are thirsty for challenges and who never settle for easy answers. We challenge some of the best offensive security pros in the world to reveal the unique traits, skills, and real-world experiences that got them where they are today. Get ready to be caught off guard as we debunk misconceptions, diss ...
  continue reading
 
Stay ahead of the latest cybersecurity trends with Cyberside Chats—your go-to cybersecurity podcast for breaking news, emerging threats, and actionable solutions. Whether you’re a cybersecurity pro or an executive who wants to understand how to protect your organization, cybersecurity experts Sherri Davidoff and Matt Durrin will help you understand and proactively prepare for today’s top cybersecurity threats, AI-driven attack and defense strategies, and more!
  continue reading
 
The Build+Revitalize podcast is an outgrowth of SME’s passion and commitment to solving problems and building better communities. We are proud to be your go-to source for insights on challenges and emerging trends in the AEC industry. In each episode, we will be joined by our partners and friends for in-depth conversations on overcoming obstacles in the AEC industry, opportunities we offer professional engineering consultants and students, and emerging technologies that optimize how we work. ...
  continue reading
 
Artwork

1
Shared Security

Tom Eston, Scott Wright, Kevin Johnson

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today's interconnected world. Tune in every week to discover invaluable insights, strateg ...
  continue reading
 
Floor Focus, and our website Floor Daily, is the oldest and most trusted flooring magazine. Our market research, strategic analysis and fashion coverage of the flooring business provides retailers, designers, architects, contractors, building owners, suppliers and other industry professionals the information they need to achieve greater success.
  continue reading
 
The Voice of Cybersecurity for MSPs & MSSPs! The CyberCall is the weekly podcast where cybersecurity meets business reality. Hosted by Andrew Morgan, Founder of Right of Boom, this is the go-to show for Managed Service Providers (MSPs), virtual CISOs (vCISOs), and IT leaders navigating the complex world of cyber risk, compliance, and AI. Each episode features raw, practical conversations with the sharpest minds in cybersecurity—from operators in the trenches to CISOs, researchers, policymake ...
  continue reading
 
Certify – Security+ 701 is your complete audio companion for mastering the CompTIA Security+ SY0-701 certification exam. Designed for aspiring cybersecurity professionals, this narrated series breaks down every domain of the official exam objectives with clarity, focus, and real-world context. Whether you’re commuting, exercising, or studying at home, each episode delivers concise, engaging, and exam-relevant content to help you pass with confidence. Created by cybersecurity author and educa ...
  continue reading
 
Artwork

1
SecurityMetrics Podcast

SecurityMetrics

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The SecurityMetrics Podcast, hosted by Jen Stone (Principal Security Analyst, QSA, CISSP, CISA), will help you understand current data security and compliance trends. Each episode will feature a different security professional offering tips and security best practices.
  continue reading
 
Ages ago, elves and dwarves unknowingly migrated between Universes via a Junction. Jenneva and Egam believe they have found a Junction and plan a trip with Alexander to test the theory and investigate the origins of the elves and dwarves. Because they believe that the perennial animosity between the two races is due to misunderstandings about their histories, the mages include the prince of elves and the prince of dwarves in the group. Trouble begins at the very start of the journey as Egam ...
  continue reading
 
Artwork

1
Hacker Talk

Firo Solutions LTD

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Hacker Talk brings you interesting conversation between some of the world best hackers, cyber security professionals and information security people.
  continue reading
 
Artwork
 
Blue Fox Group, a technology company that specializes in supporting customers with the best infrastructure, live support, and communications technology available. Supporting your business objectives and improving your bottom line.
  continue reading
 
Loading …
show series
 
In this episode, we explore the revolutionary concept of autonomous penetration testing with a discussion into Cybersecurity startup XBOW’s recent breakthrough. XBOW claims to have topped HackerOne’s leaderboard using a fully autonomous AI agent, raising significant questions about the future of offensive security. Hosts discuss the potential of AI…
  continue reading
 
In this episode, we're diving into one of the most overlooked yet dangerous components of Active Directory: Certificate Services. What was designed to build trust and secure authentication is now being exploited by attackers to silently escalate privileges and persist in your environment. We’ll break down how AD CS works, how it gets abused, and wh…
  continue reading
 
One flawed password reset. One shared session token. One dangerous object. In Episode 11 of Hacked & Secured: Pentest Exploits & Mitigations, we break down three real-world vulnerabilities where trust between systems and users broke down—with serious consequences. Account Takeover via Forgot Password – A predictable ID and exposed tokens let attack…
  continue reading
 
Chief Persuasion Officer: The New CISO Mindset NetSPI Field CISO and host of Agent of Influence podcast Nabil Hannan sat down with Rick McElroy to talk about the role of the CISO, leveraging AI in the cybersecurity space, vendor collaboration, and career advice. + + + Find more episodes on YouTube or wherever you listen to podcasts, as well as at n…
  continue reading
 
In this powerful and heartfelt episode of Simply Offensive, Phillip Wylie is joined by Joe Brinkley, better known as The Blind Hacker, Founder of the DeadPixelSec community and a seasoned offensive security professional. Joe shares his journey from sysadmin to red teamer, his philosophy on mentorship, and candid insights on burnout in cybersecurity…
  continue reading
 
On July 13, 2025, a developer at the Department of Government Efficiency—DOGE—accidentally pushed a private xAI API key to GitHub. That key unlocked access to 52 unreleased LLMs, including Grok‑4‑0709, and remained active long after discovery. In this episode of Cyberside Chats, we examine how a single leaked credential became a national-level risk…
  continue reading
 
Last week, we tackled a big one: 'Risk, Revenue, Responsibility: The Real Job of the vCISO — and it sparked an incredible conversation around how vCISOs are no longer just about frameworks and firewalls, but about protecting business outcomes, navigating executive risk, and helping clients make strategic decisions. This week, we’re taking it a step…
  continue reading
 
In this episode, join hosts Tom Eston, Scott Wright, and Kevin Johnson as they discuss the controversial topic of seniors writing down passwords. They discuss how threat modeling differs for the elderly, the practicality of using password managers, two-factor authentication, and future solutions like passkeys. The conversation includes humorous ane…
  continue reading
 
In this episode, join hosts Tom Eston, Scott Wright, and Kevin Johnson as they discuss the controversial topic of seniors writing down passwords. They discuss how threat modeling differs for the elderly, the practicality of using password managers, two-factor authentication, and future solutions like passkeys. The conversation includes humorous ane…
  continue reading
 
It’s easy to overlook small misconfigurations on Windows endpoints, but those little mistakes can create big opportunities for attackers. In this episode, we break down the most common Windows security missteps we see in real-world environments, from missing the basics to reused local admin passwords. If you’re a sysadmin, IT admin, or just respons…
  continue reading
 
As cybersecurity regulations tighten across the automotive industry, OEMs and suppliers are under growing pressure to not only build secure vehicles but also prove compliance across their entire software and hardware stack. In this episode of Cars, Hackers, and Cyber Security, we explore the key strategies for mastering compliance with global autom…
  continue reading
 
On this EM Quick Hits podcast: Pediatric Torticollis with Dr. Deb Shconfeld, Approach to Stable Wide Complex Tachydysrhythmias with Dr. Anand Swaminathan, Post-intubation Neurocritical Care 5 best practices with Dr. Andrew Petrosoniak, Hyponatremia Correction Rates with Dr. Justin Morgenstern, Paronychia Management with Dr. Andrew Tagg, and Women i…
  continue reading
 
In this episode of Simply Offensive, host Phillip Wylie welcomes offensive security veteran Ben Thal for a deep dive into the world of red teaming, penetration testing, and breaking into offensive security. With over a decade of experience across red teaming, pen testing, and hardware hacking, Ben brings practical insights for anyone interested in …
  continue reading
 
Why do so many major cyberattacks happen over holiday weekends? In this episode, Sherri and Matt share their own 4th of July anxiety as security professionals—and walk through some of the most infamous attacks timed to exploit long weekends, including the Kaseya ransomware outbreak, the MOVEit breach, and the Bangladesh Bank heist. From retail brea…
  continue reading
 
In this episode of The CyberCall, we're cutting through the noise and rethinking the true purpose of the vCISO role. It’s not just about frameworks, policies, and tech stacks, it’s about tying risk to business outcomes (risk to revenue). The vCISO’s true value goes way beyond compliance checklists and technical jargon; it’s about being a business p…
  continue reading
 
In this episode, we discuss the often overlooked security issues within Google Workspace. Rajan Kapoor, Field CISO at Material Security, joins us to talk about how Material Security is redefining the protection of documents, email accounts, and data in Google Workspace. We explore the unique challenges Workspace presents compared to traditional too…
  continue reading
 
In this episode, we discuss the often overlooked security issues within Google Workspace. Rajan Kapoor, Field CISO at Material Security, joins us to talk about how Material Security is redefining the protection of documents, email accounts, and data in Google Workspace. We explore the unique challenges Workspace presents compared to traditional too…
  continue reading
 
In this episode, we dive into the unique cybersecurity challenges faced by the financial services sector, from high-value targets and strict compliance requirements to the constant threat of phishing and ransomware. We’ll break down common attack paths, what makes financial orgs so attractive to threat actors, and most importantly, what IT and secu…
  continue reading
 
Send us a text In this episode, Bart Wolbers sits down with Forrest Smith, CEO of Kineon, live from the Health Optimization Summit in Austin, Texas. Forrest has spent years at the forefront of photobiomodulation technology, and today, he shares insights into one of the most exciting frontiers in wellness: light therapy and gut health. Together, the…
  continue reading
 
In this episode of The BlueHat Podcast, host Nic Fillingham is joined by George Hughey from Microsoft who returns to discuss his Blue Hat India talk on variant hunting, explaining how MSRC uses submission data from hacking competitions like Pwn2Own and Tianfu Cup to uncover additional security vulnerabilities in Windows. George shares how incentive…
  continue reading
 
In this episode of Simply Offensive, Phillip Wylie interviews Amélie Koran, a seasoned expert in offensive security and AI red teaming. They discuss the evolution of red teaming, the challenges and opportunities presented by AI in security, and the importance of human expertise in navigating the complexities of cybersecurity. The conversation also …
  continue reading
 
Scott Banda, co-founder of Climit, and Ali Cheloei, president of Abbey Commercial Flooring, a commercial flooring contractor in the Washington, D.C. area, discuss the benefit of using Climit site monitoring on job sites to ensure site conditions are within spec before the flooring is installed.By Floor Focus Magazine
  continue reading
 
In June 2025, the White House issued an executive order that quietly eliminated several key federal cybersecurity requirements. In this episode of Cyberside Chats, Sherri and Matt break down exactly what changed—from the removal of secure software attestations to the rollback of authentication requirements—and what remains in place, including post-…
  continue reading
 
Supply chain attacks doubled according to the 2025 Verizon DBIR. This week the channel awakens to Ingram Micro being attacked by the SafePay Ransomware group. Incident Response (IR) expert, Chris Loehr, EVP of Solis joins The CyberCall, to share perspective on the GlobalProtect VPN compromise. That’s why today on today's CyberCall, we’re talking ab…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play