Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics. [email protected]
…
continue reading
Pentest Podcasts
Barcode is a cocktail powered podcast that dives into the technology, personalities, criminals, and heroes that have come to define modern security across the globe. Hosted by Chris Glanden.
…
continue reading
The show that decrypts the secrets of offensive cybersecurity, one byte at a time. Every week I invite you into the world of ethical hacking by interviewing leading offensive security practitioners. If you are a penetration tester, bug bounty hunter, red teamer, or blue teamer who wants to better understand the modern hacker mindset, whether you are new or experienced, this show is for you.
…
continue reading
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, develop ...
…
continue reading
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
…
continue reading
We think we know how computer systems work, but how come they keep surprising us? We also think we know how humans behave, but we keep finding out we don’t. This podcast is for ethical hackers who are thirsty for challenges and who never settle for easy answers. We challenge some of the best offensive security pros in the world to reveal the unique traits, skills, and real-world experiences that got them where they are today. Get ready to be caught off guard as we debunk misconceptions, diss ...
…
continue reading
Bite-sized education for a big-impact world. As the smaller, approachable sibling to the long-form and complex Bare Metal Cyber podcast, Dot Ones are perfect for quick learning moments that build on the larger journey of understanding. Each episode dives into essential topics, breaking down complex ideas into targeted and straightforward lessons—all in under 15 minutes. Whether you're just starting or brushing up, Dot Ones offers practical knowledge in an accessible format, making learning q ...
…
continue reading
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
…
continue reading
Join an all-star cast — including Dan DeCloss and Shawn Scott from PlexTrac, Paul Asadoorian and Tyler Robinson from Security Weekly, and Bryson Bort from SCYTHE — for a podcast mini-series focused on getting the real work done in cybersecurity. These four episodes will consider the perspectives of red, blue, and purple teamers alike in tracking signal through the noise to identify and prioritize the right things. Additionally, we’ll show off how PlexTrac empowers all types of security pros ...
…
continue reading
Join an all-star cast — including Dan DeCloss and Shawn Scott from PlexTrac, Paul Asadoorian and Tyler Robinson from Security Weekly, and Bryson Bort from SCYTHE — for a podcast mini-series focused on getting the real work done in cybersecurity. These four episodes will consider the perspectives of red, blue, and purple teamers alike in tracking signal through the noise to identify and prioritize the right things. Additionally, we’ll show off how PlexTrac empowers all types of security pros ...
…
continue reading
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
Cybersecurity career, technology, and success tips.
…
continue reading
Your anything goes security podcast presented to you by Black Lantern Security
…
continue reading
Welcome to The MLSecOps Podcast, presented by Protect AI. Here we explore the world of machine learning security operations, a.k.a., MLSecOps. From preventing attacks to navigating new AI regulations, we'll dive into the latest developments, strategies, and best practices with industry leaders and AI experts. Sit back, relax, and learn something new with us today. Learn more and get involved with the MLSecOps Community at https://bit.ly/MLSecOps.
…
continue reading
Welcome to the Bug Hunter Podcast by Pentesterland, a podcast for pentesters & bug bounty hunters. We tackle technical questions & inspirational topics to help you develop both a hacker skillset & mindset.
…
continue reading
A new independent Podcast focusing on all things IT Security, although with a SOC focus. From Incident Response, Pen Testing, Ransomware and Digital Forensics, through to hiring, certification and recruitment. Enjoy a mix of up-to-date commentary and guest interviews with a few laughs and stories along the way.
…
continue reading
Technology tips and insights to help protect your business! We offer weekly interviews with industry experts and leaders from companies like Coca-Cola, Verizon and AT&T to share their insights on cybersecurity and other technology topics. Join your host, Shaun St.Hill, the CEO of Tech and Main!
…
continue reading
It takes a lot to solve complex data problems securely. A sandbox is the perfect space to discover new approaches. In season two of Security Sandbox, Relativity CSO & CIO Amanda Fennell chats with guests about maximizing security's greatest asset—people—through meaningful use of technology and process, creative and compassionate training, and the conviction that there is room for taking risk in security.
…
continue reading
A podcast that explores the stories of real people, their work, and its impact on the information security industry. Join security expert Caroline Wong as she focuses on the human side of security. Don't forget to follow the podcast on Twitter: https://twitter.com/humansofinfosec
…
continue reading
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
…
continue reading
This Cyber Security podcast is intended to help people better protect themselves from Cyber criminals by offering quick tips, hacking news summaries and interviews with industry professionals. USB our Guest is the cyber security podcast you have been looking for. Offering quick tips and attack overviews 5-10 minutes in length intended to help people better protect themselves from Cyber criminals and 1-2hr interviews with industry professionals. From 2FA to Zero-Days and everything in between ...
…
continue reading

1
7MS #692: Tales of Pentest Pwnage – Part 76
32:45
32:45
Play later
Play later
Lists
Like
Liked
32:45Happy Friday! Today’s another hot pile of pentest pwnage. To make it easy on myself I’m going to share the whole narrative that I wrote up for someone else: I was on a pentest where a DA account would sweep the networks every few minutes over SMB and hit my box. But SMB signing was on literally everywhere. The fine folks here recommended I try rela…
…
continue reading

1
Ep. 12 – Timing Attacks & Mobile OAuth Hijack: When Microseconds and Misflows Betray You
14:09
14:09
Play later
Play later
Lists
Like
Liked
14:09A few microseconds. One silent browser session. That’s all it took for attackers to break into systems without tripping a single alert. In this episode of Hacked & Secured: Pentest Exploits & Mitigations, we explore two subtle but devastating flaws: 🔹 Timing Attacks for Token Leaks – By measuring microsecond delays, attackers were able to recover s…
…
continue reading

1
Episode 149: Building a Security Stack That Works A Practitioner’s Perspective
36:33
36:33
Play later
Play later
Lists
Like
Liked
36:33In this episode, Brad and Spencer sit down with an experienced information security and risk manager to explore how they build and manage their security stack, choose the right tools, and win support from their team and leadership. We dig into the balance between technical defenses and business-driven risk management, from budgeting and vendor sele…
…
continue reading
"Revelation" is about exposing what’s hidden: Vulnerabilities, Truths, and the role of hackers in revealing them.In this conversation, Casey John Ellis, founder of Bugcrowd, shares his journey from a curious child fascinated by technology to a pioneer in crowdsourced security. He discusses the evolution of bug bounty programs, the importance of com…
…
continue reading

1
#62 Is InfoSec Slowing Down? Threat Models Explained ft. Carl Vincent (vyrus)
39:49
39:49
Play later
Play later
Lists
Like
Liked
39:49In this episode of The Hacker’s Cache, Kyser Clark sits down with Carl Vincent, better known as Vyrus, to unpack the shifting realities of cybersecurity. Carl shares straight talk on the Silver Bullet ecosystem that fraud actors rely on, why today’s cybercrime is more about account access than shell popping, and how blue teams can actually turn cri…
…
continue reading

1
7MS #691: Tales of Pentest Pwnage – Part 75
31:39
31:39
Play later
Play later
Lists
Like
Liked
31:39Holy schnikes, today might be my favorite tale of pentest pwnage ever. Do I say that almost every episode? yes. Do I mean it? Yes. Here are all the commands/links to supplement today’s episode: Got an SA account to a SQL server through Snaffler-ing With that SA account, I learned how to coerce Web auth from within a SQL shell – read more about that…
…
continue reading

1
Episode 148: Securing Windows: Common Misconfigurations That Give Attackers The Advantage
54:45
54:45
Play later
Play later
Lists
Like
Liked
54:45This is the webinar I gave in August 2025 on the topic of common Windows misconfigurations I see during internal pentests. Make sure you grab your free gifts! https://securit360.com/free-gifts https://links.spenceralessi.com/creds https://go.spenceralessi.com/windows-slides Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov…
…
continue reading

1
#61 How to Level Up Fast in Your First Cybersecurity Role ft. Ryan Daub
34:47
34:47
Play later
Play later
Lists
Like
Liked
34:47In this episode of The Hacker’s Cache, returning guest Ryan Daub shares his journey from IT support to offensive security and reveals practical advice on how to level up fast in your first cybersecurity role. We cover the importance of mastering fundamentals, documenting your work, learning from failures, and asking questions without fear. Ryan als…
…
continue reading

1
7MS #690: Tales of Pentest Pwnage – Part 74
21:13
21:13
Play later
Play later
Lists
Like
Liked
21:13Today’s tale of pentest pwnage is a classic case of “If your head is buried in the pentest sand, pop it out for a while, touch grass, and re-enumerate what you’ve already enumerated, because that can lead to absolute GOLD!”
…
continue reading
In this episode, we’re digging into one of the most overlooked parts of a penetration test, when it actually makes sense to not fix a finding. Not every vulnerability deserves equal treatment, and sometimes accepting the risk is the most mature decision a business can make. We’ll cover how to recognize those situations, avoid common pitfalls, and d…
…
continue reading

1
#60 Shellcode Evasion in 2025: What Still Works (and What Doesn’t) ft. Robert O’Connor
39:55
39:55
Play later
Play later
Lists
Like
Liked
39:55In this episode of The Hacker’s Cache, Kyser Clark sits down with Red Team Consultant Robert O’Connor to unpack the realities of shellcode evasion in 2025. They dive into how antivirus and EDR solutions actually detect malicious payloads, the rise of fileless malware, and why network-level detection is still overlooked. Robert shares his hands-on e…
…
continue reading

1
#59 Q&A: You Can’t Choose Wrong in Cybersecurity
24:19
24:19
Play later
Play later
Lists
Like
Liked
24:19In this Q&A episode of The Hacker’s Cache, Kyser Clark tackles some of the biggest questions aspiring and active cybersecurity professionals ask. From whether you should stack network pentesting certs like CPTS, OSCP, and PNPT or mix in web certifications like OSWA and CBBH, to why you really can’t choose wrong in cybersecurity as long as you keep …
…
continue reading

1
7MS #689: Pwning Ninja Hacker Academy – Part 2
15:40
15:40
Play later
Play later
Lists
Like
Liked
15:40Hello friends! Today your friend and mine, Joe “The Machine” Skeen joins me as we keep chipping away at pwning Ninja Hacker Academy! Today’s pwnage includes: “Upgrading” our Sliver C2 connection to a full system shell using PrintSpoofer! Abusing nanodump to do an lsass minidump….and find our first cred. Analyzing BloodHound data to find (and own) e…
…
continue reading

1
Episode 146: What Are the Security Implications of AI?
45:09
45:09
Play later
Play later
Lists
Like
Liked
45:09In this episode of The Cyber Threat Perspective, we’re exploring the broader security implications of artificial intelligence. AI is transforming everything—from how we defend our networks to how attackers exploit them. We’ll break down the risks, the opportunities, and what security teams need to be thinking about right now as AI becomes embedded …
…
continue reading

1
#58 Why Attention Is the Real Currency in Cybersecurity ft. Tadi
38:41
38:41
Play later
Play later
Lists
Like
Liked
38:41In this episode of The Hacker’s Cache, I sit down with penetration tester Tadi Kandango to unpack why attention is the real currency in cybersecurity. We talk about how he broke into pentesting without a degree, the role certifications actually play, and why sharing your work publicly can open more doors than quietly grinding in the background. Whe…
…
continue reading

1
From stealing servers to saving lives: Working in red teaming | Jim Broome
56:50
56:50
Play later
Play later
Lists
Like
Liked
56:50Get your FREE Cybersecurity Salary Guide: https://www.infosecinstitute.com/form/cybersecurity-salary-guide-podcast/?utm_source=youtube&utm_medium=podcast&utm_campaign=podcast Jim Broome of Direct Defense has been doing red teaming since before it became a term — back when a "pentest" meant $25,000, no questions asked and walking out with a server u…
…
continue reading

1
#57 The AI Security Threat No One Sees Coming ft. Dino Dunn
38:40
38:40
Play later
Play later
Lists
Like
Liked
38:40In this episode of The Hacker’s Cache, Kyser Clark sits down with Dino Dunn, an AI security professional and cybersecurity instructor, to uncover the hidden risks most organizations overlook when adopting large language models and AI tools. From overlooked governance issues to the dangers of Retrieval Augmented Generation (RAG) and even how comprom…
…
continue reading

1
7MS #688: Building a Pentest Training Course Is Fun and Frustrating
22:13
22:13
Play later
Play later
Lists
Like
Liked
22:13Today I talk about a subject I love while also driving me crazy at the same time: building a pentest training course! Specifically, I dissect a fun/frustrating GPO attack that I need to build very carefully so that every student can pwn it while also not breaking the domain for everybody else. I also talk about how three different flavors of AI fai…
…
continue reading

1
Episode 145: What To Do Minute 1 When Incident Response Arrives
33:46
33:46
Play later
Play later
Lists
Like
Liked
33:46In this episode, we're diving into what to do the minute incident response arrives. That first moment matters—a lot. Whether it's a ransomware attack, unauthorized access, or data exfiltration, how you act in minute one can either help or hinder the investigation. We’ll cover the do’s, don’ts, and common mistakes we see, so you’re ready when the he…
…
continue reading

1
#56 Beyond Certs: The Skills That Actually Matter in Pentesting ft. Nick Aures
37:11
37:11
Play later
Play later
Lists
Like
Liked
37:11In this episode of The Hacker’s Cache, senior penetration tester and red teamer Nick Aures shares the skills and habits that matter most in pentesting beyond certifications. We discuss real-world experiences from breaking into the field to finding critical vulnerabilities in companies like Tesla, USAA, and Asana. Nick reveals why strong communicati…
…
continue reading

1
7MS #687: A Peek into the 7MS Mail Bag – Part 5
57:26
57:26
Play later
Play later
Lists
Like
Liked
57:26Hi friends, we’re doing something today we haven’t done in a hot minute: take a dip into the 7MinSec mail bag! Today we cover these questions: If I’m starting a solo business venture as a security consultancy, is it a good idea to join forces with other solo security business owners and form a consortium of sorts? Have you ever had anything go cata…
…
continue reading

1
Why Hackers Are Stealing Encrypted Data Now To Decrypt Later | David Close
44:27
44:27
Play later
Play later
Lists
Like
Liked
44:27Get your FREE Cybersecurity Salary Guide: https://www.infosecinstitute.com/form/cybersecurity-salary-guide-podcast/?utm_source=youtube&utm_medium=podcast&utm_campaign=podcast David Close, Chief Solutions Architect at Futurex, discusses the reality facing our digital world: quantum computing will soon break the encryption protecting everything from …
…
continue reading

1
Episode 144: How Cyber Threat Actors Are Using AI
31:53
31:53
Play later
Play later
Lists
Like
Liked
31:53In this episode of The Cyber Threat Perspective, we're diving into one of the most pressing trends in cybersecurity: how threat actors are using AI. From deepfake scams and AI-generated phishing emails to automated malware and voice cloning, attackers are leveraging artificial intelligence to scale their operations and sharpen their tactics. We’ll …
…
continue reading
Ted Harrington explains the power of the hacker mindset and its impact far beyond cybersecurity. He unpacks how curiosity, creativity, and the drive to challenge assumptions can unlock new ways of thinking and problem-solving across all areas of life. Ted offers practical exercises to develop this mindset, shares strategies to overcome imposter syn…
…
continue reading

1
#55 Do Cybersecurity Certifications Really Get You Hired in 2025?
26:07
26:07
Play later
Play later
Lists
Like
Liked
26:07Are cybersecurity certifications still worth it in 2025? Or are they just expensive pieces of paper with no real impact on your job prospects? In this solo episode, Kyser Clark cuts through the noise and tackles the growing wave of anti-certification advice circulating online. He shares what he's actually seeing in the job market, why certification…
…
continue reading

1
7MS #686: Our New Pentest Training Course is Almost Ready
23:30
23:30
Play later
Play later
Lists
Like
Liked
23:30Oh man, I’m so excited I can hardly sleep. Our new three-day (4 hours per day) training is getting closer to general release. I talk about the good/bad/ugly of putting together an attack-sensitive lab that students can abuse (but hopefully not break!), and the technical/curriculum-writing challenges that go along with it.…
…
continue reading

1
Episode 143: Stop Wasting Money on Pentests - Do This First
44:46
44:46
Play later
Play later
Lists
Like
Liked
44:46In this episode, we break down a question that often gets overlooked: When should you not do a penetration test? Not every organization needs a pentest right away, and choosing the wrong assessment can waste time, money, and effort. We’ll walk through the differences between pentests, vulnerability scans, and risk assessments — and when each one is…
…
continue reading

1
Working in ransomware response, investigation and recovery | John Price
35:58
35:58
Play later
Play later
Lists
Like
Liked
35:58Get your FREE Cybersecurity Salary Guide: https://www.infosecinstitute.com/form/cybersecurity-salary-guide-podcast/?utm_source=youtube&utm_medium=podcast&utm_campaign=podcast John Price of SubRosa joins today's Cyber Work Podcast to share insights from his unique career path spanning UK military counterintelligence, banking cybersecurity and foundi…
…
continue reading

1
#54 Offensive Security for Blue Teamers: Why Red Team Knowledge Changes Everything ft. Josh Ragland
37:51
37:51
Play later
Play later
Lists
Like
Liked
37:51In this episode of The Hacker’s Cache, returning guest Josh Ragland shares how offensive security skills give blue teamers a serious edge. From building a hash-cracking rig to diving deep into C programming and assembly, Josh explains how understanding the attacker’s mindset can drastically cut triage time and help defenders spot threats others mis…
…
continue reading

1
7MS #685: The Time My Neighbor Almost Got Scammed Out of $13K
22:56
22:56
Play later
Play later
Lists
Like
Liked
22:56Today’s kind of a “story time with your friend Brian” episode: a tale of how my neighbor almost got scammed out of $13k. The story has a lot of red flags we can all keep in mind to keep ourselves (as well as kids/friends/parents/etc.) safer from these types of shenanigans.
…
continue reading

1
Episode 142: How Active Directory Certificates Become Active Threats
35:56
35:56
Play later
Play later
Lists
Like
Liked
35:56In this episode, we're diving into one of the most overlooked yet dangerous components of Active Directory: Certificate Services. What was designed to build trust and secure authentication is now being exploited by attackers to silently escalate privileges and persist in your environment. We’ll break down how AD CS works, how it gets abused, and wh…
…
continue reading