Phillip Wylie interviews cybersecurity industry experts on offensive security and techniques around penetration testing and red teaming.
…
continue reading
Penetration Testing Podcasts
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
…
continue reading
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics. [email protected]
…
continue reading
Emergency Medicine Cases – Where the Experts Keep You in the Know. For show notes, quizzes, videos and more learning tools please visit emergencymedicinecases.com
…
continue reading
The CISO Signal is a true cybercrime podcast investigating the most consequential breaches, insider threats, takedowns, and nation-state hacks shaping today’s digital world. Each episode combines gripping, cinematic storytelling with exclusive interviews from top CISOs and cybersecurity leaders. Together, we break down how the world’s most dangerous cyberattacks unfolded and what today’s security professionals must learn from them. Whether you’re a Chief Information Security Officer, a secur ...
…
continue reading
This podcast contains security topics discussed by the Secure Ideas LLC. team.
…
continue reading
With such countless organizations succumbing to cybercriminals attacks, organizations should go the additional mile to get internal and external web applications. Numerous organizations feel that vulnerability examines are sufficient for finding security failings in a web application. While vulnerability scans can feature known shortcomings, web application penetration testing shows you how well they would hold up in a true attack by unapproved or unauthorized clients.
…
continue reading
Engineers consistently exclude non-technical people from understanding enough about technology to better utilise it. This is wrong! Engineers should be equipping non-technical people with enough of an understanding to make the right business decisions, without trying to drag them all the way down into the detail.
…
continue reading
Hacked Off demystifies the world of cybersecurity. Hosted by Secarma's Managing Director, Holly Grace Williams, it features weekly interviews delving beneath the headlines of the latest hacks, breaches and vulnerabilities, providing expert advice on how to stay safe online. This podcast is brought to you by global cybersecurity and penetration testing company, Secarma.
…
continue reading
My name is Alex Fergus, and I'm a health and technology geek providing in-depth, independent product reviews on the latest red light therapy devices. With over seven years of experience studying light therapy and having used and tested dozens of hundreds of light therapy products, you can be sure that I'll have a video to help you with your educational or product-buying needs. Test, review, compare, and study all things Red Light Therapy. Whether you're seeking out the best Red Light Body Pa ...
…
continue reading
a 360 aerial penetration entrance at the beginning of every episode (an inhuman erection)
…
continue reading
Hack for Fun and Profit is a weekly podcast for anyone who is interested in ethical hacking. The topics include bug bounty hunting, penetration testing, red teaming and many more. Sit back and enjoy stories, tips and tricks that will inspire you. For subscription-only episodes, enroll using this link: https://anchor.fm/thehackerish/subscribe
…
continue reading
Felix explores Internet of Things (IoT) and Operational Technology cyber security. Perfect for project managers, developers, and those learning about penetration testing in this niche area. Email Felix using [email protected] Get more information at the website: yougottahackthat.com Find You Gotta Hack That on LinkedIn and X @gotta_hack
…
continue reading
It’s like therapy—for B2B marketers. On Marketing Dilemmas, host Liam Bartholomew unpacks one big marketing headache at a time—with help from leaders who’ve been there, failed, and figured out what works.
…
continue reading
Since 2005, BlueHat has been where the security research community, and Microsoft, come together as peers; to debate, discuss, share, challenge, celebrate and learn. On The BlueHat Podcast, Microsoft and MSRC’s Nic Fillingham and Wendy Zenone will host conversations with researchers and industry leaders, both inside and outside of Microsoft, working to secure the planet’s technology and create a safer world for all.
…
continue reading
Tune in as our hosts answer questions from small business leaders! We will discuss real-world Information Security challenges faced by our callers and offer relevant advice and guidance.
…
continue reading
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, develop ...
…
continue reading
We think we know how computer systems work, but how come they keep surprising us? We also think we know how humans behave, but we keep finding out we don’t. This podcast is for ethical hackers who are thirsty for challenges and who never settle for easy answers. We challenge some of the best offensive security pros in the world to reveal the unique traits, skills, and real-world experiences that got them where they are today. Get ready to be caught off guard as we debunk misconceptions, diss ...
…
continue reading
The show that decrypts the secrets of offensive cybersecurity, one byte at a time. Every week I invite you into the world of ethical hacking by interviewing leading offensive security practitioners. If you are a penetration tester, bug bounty hunter, red teamer, or blue teamer who wants to better understand the modern hacker mindset, whether you are new or experienced, this show is for you.
…
continue reading
The Build+Revitalize podcast is an outgrowth of SME’s passion and commitment to solving problems and building better communities. We are proud to be your go-to source for insights on challenges and emerging trends in the AEC industry. In each episode, we will be joined by our partners and friends for in-depth conversations on overcoming obstacles in the AEC industry, opportunities we offer professional engineering consultants and students, and emerging technologies that optimize how we work. ...
…
continue reading
On the front lines of technology and business there is a battle of survival. Behind the scenes, businesses are on a mission to keep a vigilant watch for threats in an ongoing Cyber War. But it's not just about malware, ransomware, and breaches anymore. The obstacles and barriers companies face today are bigger and badder than ever — and these cyber threats are forcing them to prove they're secure for the future. So when you need answers to win the battle, tune into Cyber Security America wit ...
…
continue reading
Taking the Fandoms you love and building worlds to play Dungeons and Dragons in. Homebrew Avengers, Percy Jackson & the Olympians, and Star Wars so far - what will we do next?
…
continue reading
Podcast by CyberTalk
…
continue reading
Inspirational stories of black women in tech. Support this podcast: https://podcasters.spotify.com/pod/show/frauvis/support
…
continue reading
Ages ago, elves and dwarves unknowingly migrated between Universes via a Junction. Jenneva and Egam believe they have found a Junction and plan a trip with Alexander to test the theory and investigate the origins of the elves and dwarves. Because they believe that the perennial animosity between the two races is due to misunderstandings about their histories, the mages include the prince of elves and the prince of dwarves in the group. Trouble begins at the very start of the journey as Egam ...
…
continue reading
The SecurityMetrics Podcast, hosted by Jen Stone (Principal Security Analyst, QSA, CISSP, CISA), will help you understand current data security and compliance trends. Each episode will feature a different security professional offering tips and security best practices.
…
continue reading
Blue Fox Group, a technology company that specializes in supporting customers with the best infrastructure, live support, and communications technology available. Supporting your business objectives and improving your bottom line.
…
continue reading
Hacker Talk brings you interesting conversation between some of the world best hackers, cyber security professionals and information security people.
…
continue reading
The one and only official podcast from OffSec, Inc. -- creators of the Kali OS, the OSCP certification, and the world's leading cybersecurity training
…
continue reading
1
HACKED: Into the minds of Cybersecurity leaders
Talking cybersecurity with nexus IT Security group
We are giving an inside look into the minds of today's cybersecurity leaders and defining trends for the upcoming threat landscape, what’s top of mind for security leaders, and advise for security leaders and practitioners.
…
continue reading
1
Unlocking Advanced Penetration Testing with Greg Hatcher & John Stigerwalt
28:56
28:56
Play later
Play later
Lists
Like
Liked
28:56In this episode of Simply Offensive, Phillip Wylie is joined by Greg Hatcher and John Stigerwalt from White Knight Labs. They discuss their backgrounds in cybersecurity, the importance of advanced penetration testing, and the unique offerings of their training courses. The conversation covers various aspects of cybersecurity, including ransomware s…
…
continue reading
1
#70 From Teen Hacker to Professional Pentester: The Journey of Kyle Hoehn
37:34
37:34
Play later
Play later
Lists
Like
Liked
37:34In this episode of The Hacker’s Cache, Kyser Clark sits down with seasoned penetration tester Kyle Hoehn to unpack the journey from a curious teen experimenting online to a full time professional in offensive security. Kyle shares how early exposure to computer tinkering and real world troubleshooting shaped his path, why foundational IT knowledge …
…
continue reading
In this episode of Simply Offensive, Phillip Wylie interviews Danny Jenkins, CEO and founder of ThreatLocker. Danny shares his unique journey from corporate IT to ethical hacking, discussing his innovative approach to penetration testing and cybersecurity. He emphasizes the importance of understanding technology and security configurations, the rol…
…
continue reading
1
The chat-based search dilemma: Is Keyword Research Obsolete? With Zak Ali, Finder
44:05
44:05
Play later
Play later
Lists
Like
Liked
44:05Chat-based search and LLMs are blowing up the old keyword-first playbook. Zach Ali (GM, US at Finder) makes the case for “anti-SEO”: persona-led content, utility over templates, and measuring revenue and LLM visibility - not vanity traffic. We dig into query fan-out (why many focused pages beat one pillar), how first-party data and calculators earn…
…
continue reading
Today we discuss some pre-travel tips you can use before hopping on a plane to start a work/personal adventure. Tips include: Updating the family DR/BCP plan Lightening your purse/wallet Validating/testing backups and restores Ensuring your auto coverage is up to snuff
…
continue reading
In this episode, we're taking a deep dive into how the Offensive Security group at SecurIT360 is strategically leveraging and utilizing artificial intelligence technologies in offensive security operations. We'll explore the innovative ways this team is harnessing the power of AI to enhance their penetration testing capabilities, automate security …
…
continue reading
1
#69 Why He Left a Safe Job to Hack Companies for a Living ft. Jim Schultz
33:13
33:13
Play later
Play later
Lists
Like
Liked
33:13In this episode of The Hacker’s Cache, Kyser Clark sits down with Jim Schultz, an OSCP-certified penetration tester, cybersecurity instructor, and consultant with over 15 years of experience. Jim shares his journey from taking apart his first family computer in the 90s to teaching hundreds of students and returning full-time to the world of ethical…
…
continue reading
1
Ep 208 Paradigm Shift in Ischemic Stroke Management Part 1: Disabling Strokes
1:36:12
1:36:12
Play later
Play later
Lists
Like
Liked
1:36:12We are amidst a paradigm shift in the emergency management of acute ischemic stroke. The traditional way of categorizing ischemic strokes as 'minor' vs 'major' is no longer relevant to what we do in the ED. It's now about 'disabling' vs 'non-disabling' strokes. And this is no small change. This categorization dictates urgency of ED work-up and trea…
…
continue reading
1
Identity-based Cyber: Jasson Casey on Beyond Identity and the Future of Cybersecurity
41:58
41:58
Play later
Play later
Lists
Like
Liked
41:58In episode 45, we sit down with Jasson Casey, CEO and Co-Founder of Beyond Identity, to explore how identity has become the new perimeter in cybersecurity. With over two decades of experience across security, networking, and software-defined infrastructure, Jasson unpacks why traditional defenses are failing and how the next generation of identity …
…
continue reading
1
The $610 Million Poly Network Hack: The Greatest Heist That Never Was
32:52
32:52
Play later
Play later
Lists
Like
Liked
32:52The $610 Million Poly Network Hack: The Greatest Heist That Never Was In one of the most shocking moments in crypto history, a lone hacker exploited a vulnerability in Poly Network’s cross-chain protocol—draining over $610 million in digital assets across Ethereum, Binance Smart Chain, and Polygon. Then, in a twist no one saw coming… they gave it a…
…
continue reading
Today I give a quick review of the cloud version of ProjectDiscovery (not a sponsor!).
…
continue reading
1
Episode 154: Pentesting on a Budget for IT Admins
25:56
25:56
Play later
Play later
Lists
Like
Liked
25:56This episode is all about pentesting on a budget for IT Admins. This episode is inspired by the PDQ Live stream held on October 23rd, 2025, where Spencer shared tips, tactics, tools and advice for IT admins wanting to better defend and protect their environments. All tools, checklists, guides and resources can be found here: https://go.spenceraless…
…
continue reading
1
Incident Response planning and tabletop drills
52:58
52:58
Play later
Play later
Lists
Like
Liked
52:58The Mindful Business Security Show is a call-in radio style podcast for small business leaders. Join our hosts as they take questions from business leaders like you! This episode was recorded live at the 2025 Blue Team Con conference in Chicago, Illinois. On this episode, Accidental CISO is joined by guest host 0DDJ0BB. 0J is the Director of Detect…
…
continue reading
1
#68 Q&A: Why You’ll Fail in Cybersecurity if You Stop Learning
35:51
35:51
Play later
Play later
Lists
Like
Liked
35:51In this episode of The Hacker’s Cache Podcast, Kyser Clark answers real cybersecurity career questions from whether the OSCP or Hack The Box CPTS is better for breaking into pentesting, to how to renew your Security+ the smart way, and why cybersecurity isn’t for those who hate learning. He also exposes the truth behind bootcamps, entry-level job m…
…
continue reading
1
Episode 075 - Why “Scan, Find, Patch” Is No Longer Enough - Mark Goldenberg
25:44
25:44
Play later
Play later
Lists
Like
Liked
25:44The traditional "scan, find, patch" method is falling short against today’s threat landscape. In this episode, Mark Goldenberg, Sr. Security Solutions Architect at Defy Security, outlines a modern approach to vulnerability management. Tune in to learn how to level-up your proactive security efforts by focusing on risk prioritization, fostering coll…
…
continue reading
1
30 Certifications and Counting with Jacob Krell
26:49
26:49
Play later
Play later
Lists
Like
Liked
26:49In this episode of Simply Offensive, Phillip Wylie is joined by Jacob Krell, a cybersecurity professional with a wealth of certifications and experience. Jacob shares his journey into the world of hacking, the importance of personal branding, and how to avoid burnout while pursuing certifications. He discusses the significance of CVEs, the role of …
…
continue reading
1
The Post-Test Drop-Off Dilemma: Why Wins Fade with Estelle Marasigan, Website and Creative Services Lead at Cognism
40:05
40:05
Play later
Play later
Lists
Like
Liked
40:05Liam sits down with Estelle, Cognism’s Website & Creative Services Lead, to unpack a common dilemma: why “winning” A/B tests sometimes fade after rollout. They dig into a post-launch performance framework (7/30/60/90-day checks), how to control for seasonality and site changes, the role of sales/MarOps in attribution, and turning test insights into…
…
continue reading
1
7MS #697: Pwning Ninja Hacker Academy – Part 4
13:22
13:22
Play later
Play later
Lists
Like
Liked
13:22Today your pal and mine Joe "The Machine" Skeen pwn one of the two Ninja Hacker Academy domains! This pwnage included: Swiping service tickets in the name of high-priv users Dumping secrets from wmorkstations Disabling AV Extracting hashes of gMSA accounts We didn't get the second domain pwned, and so I was originally thinking about doing a part 5 …
…
continue reading
1
Episode 153: How to Prove Your Security Works Before Attackers Do
33:04
33:04
Play later
Play later
Lists
Like
Liked
33:04In this episode, we dig into how to move from “we think we’re secure” to “we can prove it.” We’ll lay out a practical loop for validating controls, gathering evidence, and tracking results that leadership understands. If you’ve ever wondered how to demonstrate security value beyond dashboards and audits, this is your playbook. Blog: https://offsec.…
…
continue reading
1
Surviving Ransomware: Strategies and Stories with Cybersecurity Expert Matthew Waddell
42:23
42:23
Play later
Play later
Lists
Like
Liked
42:23In episode 44 of Cyber Security America, host Joshua Nicholson sits down with Matthew Waddell, a battle-tested cybersecurity leader with over 25 years of experience in digital forensics, incident response, and ransomware defense. From conducting "just-in-time forensics" under combat conditions in Iraq and Afghanistan to leading global ransomware in…
…
continue reading
1
#67 Living Outside the U.S.? Here’s How to Get Into Cybersecurity Anyway ft. Bhanu Reddy
32:40
32:40
Play later
Play later
Lists
Like
Liked
32:40In this episode of The Hacker’s Cache, Kyser Clark sits down with cybersecurity professional and entrepreneur Bhanu Reddy to talk about how to start a cybersecurity career from anywhere in the world, even if you live outside the U.S. or in a developing country. Bhanu shares his real journey from India to the United States, including how he passed t…
…
continue reading
1
Arrested During a Pentest with Corey LeBleu
27:10
27:10
Play later
Play later
Lists
Like
Liked
27:10Welcome to the Season 2 premiere of Simply Offensive. In this episode of Simply Offensive, Phillip Wylie is joined by Corey LeBleu, a cybersecurity professional with over 20 years of experience in penetration testing. Tune in to learn about Corey's background - and his experience being arrested while on a pentest. Corey has expertise across multipl…
…
continue reading
1
The $25 Million Arup Deepfake: AI's Most Convincing Con
40:49
40:49
Play later
Play later
Lists
Like
Liked
40:49The $25 Million Arup Deepfake: AI's Most Convincing Con In a world where AI can mimic voices and faces perfectly, even the most secure companies can fall victim. The Arup Deepfake Hack shocked the corporate world when attackers used AI-generated video of the company’s CFO to trick an employee into wiring $25 million to a fraudulent account. This wa…
…
continue reading
1
7MS #696: Baby's First Security Ticketing System
27:45
27:45
Play later
Play later
Lists
Like
Liked
27:45In today's episode: I got a new podcast doodad I really like JitBit as a security ticketing system (not a sponsor) The Threat Hunting with Velociraptor 2-day training was great. Highly recommend. I got inspired to take this class after watching the 1-hour primer here.
…
continue reading
1
(replay) Common Pentest Findings That Shouldn't Exist in 2025
27:23
27:23
Play later
Play later
Lists
Like
Liked
27:23In this episode of The Cyber Threat Perspective, we highlight the pentest findings that, frankly, have no business showing up in 2025. From accounts with weak passwords and no MFA to plaintext credentials on file shares, we break down the common misconfigurations and oversights that attackers still abuse, despite years of seeing the same issues ove…
…
continue reading
1
#66 The #1 Thing That Makes Pentesting Fun (Not Stressful) ft. Trent Miller
37:36
37:36
Play later
Play later
Lists
Like
Liked
37:36In this episode of The Hacker’s Cache, I sit down with penetration tester and security researcher Trent Miller (AzureAD) to talk about the one thing that makes pentesting fun instead of stressful: genuine friendships and community. We discuss how learning from other hackers, sharing experiences, and joining groups like DEF CON DC608 can accelerate …
…
continue reading
1
EM Quick Hits 68 Osteomyelitis, Tourniquet Technique, Pediatric Distal Radius Buckle Fractures, DSI RCT, AMS in ESRD & Dialysis, EM Leadership Spotlight #3
1:25:12
1:25:12
Play later
Play later
Lists
Like
Liked
1:25:12By Dr. Anton Helman
…
continue reading
1
Beyond the ICP: Rethinking Reach in B2B Marketing with Deivis Rupslaukis
49:29
49:29
Play later
Play later
Lists
Like
Liked
49:29
…
continue reading
1
7MS #695: Tales of Pentest Pwnage - Part 78
15:57
15:57
Play later
Play later
Lists
Like
Liked
15:57Today's tale of pentest pwnage involves: Using mssqlkaren to dump sensitive goodies out of SCCM Using a specific fork of bloodhound to find machines I could force password resets on (warning: don't do this in prod…read this!) Don't forget to check out our weekly Tuesday TOOLSday – live every Tuesday at 10 a.m. over at 7MinSec.club!…
…
continue reading
In this episode, Spencer and Brad dig into a question that comes up all the time: what exactly is offensive security? Hint: it’s not just “pentesting.” Offensive security covers a whole spectrum of activities, including, penetration testing, red teaming, purple teaming, adversary emulation, and more. We’ll break down what each of these means, how t…
…
continue reading
1
Can Red Light Therapy Boost Fertility? Science Explained
30:19
30:19
Play later
Play later
Lists
Like
Liked
30:19Send us a text Can red light therapy really improve fertility in both men and women? In this episode, Bart Wolbers sits down with Forrest Smith, CEO of Kineon, to discuss groundbreaking research and real-world results on how light therapy affects PCOS, endometriosis, testosterone levels, and sperm health. Show Notes Fertility challenges affect mill…
…
continue reading
1
Special Episode - SMB Security Awareness Training 2025
1:33:31
1:33:31
Play later
Play later
Lists
Like
Liked
1:33:31The Mindful Business Security Show is a call-in radio style podcast for small business leaders. This time, Accidental CISO is joined by guest host Tailor Tolliver. Tailor is a cybersecurity consultant, fitness coach, and content creator with a passion for helping others succeed. In this special episode, they present a security awareness training se…
…
continue reading
1
#65 Why You Can’t Find a Job After Passing OSCP
38:40
38:40
Play later
Play later
Lists
Like
Liked
38:40Struggling to land a cybersecurity job after passing the OSCP? In this episode of The Hacker’s Cache, I break down why the OSCP certification alone isn’t enough to secure a penetration testing role. From the importance of starting in entry-level IT positions and gaining real-world technical experience, to building soft skills, showcasing work ethic…
…
continue reading
1
Ep. 13 – nOAuth Account Misbinding & Assumed-Breach to Domain Admin (Season Finale)
15:09
15:09
Play later
Play later
Lists
Like
Liked
15:09One misbound identity. One exposed internal path. Two routes to total compromise. In this season finale of Hacked & Secured: Pentest Exploits & Mitigations, we break down two real-world findings that show how small trust assumptions can unravel entire systems: nOAuth (SSO account misbinding) — Multi-tenant SSO auto-linked accounts by email instead …
…
continue reading
1
7MS #694: Tales of Pentest Pwnage – Part 77
33:11
33:11
Play later
Play later
Lists
Like
Liked
33:11Hey friends, today I talk about how fun it was two combine two cool pentest tactics, put them in a blender, and move from local admin to mid-tier system admin access (with full control over hundreds of systems)! The Tuesday TOOLSday video we did over at 7minsec.club will help bring this to life as well.…
…
continue reading
1
Episode 151: Tool Time - PingCastle for Defenders
42:27
42:27
Play later
Play later
Lists
Like
Liked
42:27In this episode, we’re digging into a super awesome Active Directory security tool called PingCastle. We’ll cover what it is, why it matters for Active Directory security, and how IT and security teams can leverage it to get ahead of adversaries. PingCastle is a staple tool on our internal pentesting toolbelt. In this episode, you will find out why…
…
continue reading