Barcode is a cocktail powered podcast that dives into the technology, personalities, criminals, and heroes that have come to define modern security across the globe. Hosted by Chris Glanden.
…
continue reading
Pentest Podcasts
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics. [email protected]
…
continue reading
The show that decrypts the secrets of offensive cybersecurity, one byte at a time. Every week I invite you into the world of ethical hacking by interviewing leading offensive security practitioners. If you are a penetration tester, bug bounty hunter, red teamer, or blue teamer who wants to better understand the modern hacker mindset, whether you are new or experienced, this show is for you.
…
continue reading
Bite-sized education for a big-impact world. As the smaller, approachable sibling to the long-form and complex Bare Metal Cyber podcast, Dot Ones are perfect for quick learning moments that build on the larger journey of understanding. Each episode dives into essential topics, breaking down complex ideas into targeted and straightforward lessons—all in under 15 minutes. Whether you're just starting or brushing up, Dot Ones offers practical knowledge in an accessible format, making learning q ...
…
continue reading
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, develop ...
…
continue reading
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
…
continue reading
We think we know how computer systems work, but how come they keep surprising us? We also think we know how humans behave, but we keep finding out we don’t. This podcast is for ethical hackers who are thirsty for challenges and who never settle for easy answers. We challenge some of the best offensive security pros in the world to reveal the unique traits, skills, and real-world experiences that got them where they are today. Get ready to be caught off guard as we debunk misconceptions, diss ...
…
continue reading
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
…
continue reading
Welcome to Ciphered Reality – your trusted source for cybersecurity tips, tricks, and guidance. Powered by RITC Cybersecurity, this podcast is tailored for individuals and businesses looking to secure their digital assets in an increasingly connected world. We break down complex cybersecurity topics into simple, actionable insights to help you safeguard your data, identity, and online presence. Whether you’re a tech-savvy user or just getting started, Cybphered Reality helps you stay informe ...
…
continue reading
Join an all-star cast — including Dan DeCloss and Shawn Scott from PlexTrac, Paul Asadoorian and Tyler Robinson from Security Weekly, and Bryson Bort from SCYTHE — for a podcast mini-series focused on getting the real work done in cybersecurity. These four episodes will consider the perspectives of red, blue, and purple teamers alike in tracking signal through the noise to identify and prioritize the right things. Additionally, we’ll show off how PlexTrac empowers all types of security pros ...
…
continue reading
Join an all-star cast — including Dan DeCloss and Shawn Scott from PlexTrac, Paul Asadoorian and Tyler Robinson from Security Weekly, and Bryson Bort from SCYTHE — for a podcast mini-series focused on getting the real work done in cybersecurity. These four episodes will consider the perspectives of red, blue, and purple teamers alike in tracking signal through the noise to identify and prioritize the right things. Additionally, we’ll show off how PlexTrac empowers all types of security pros ...
…
continue reading
Cybersecurity career, technology, and success tips.
…
continue reading
Your anything goes security podcast presented to you by Black Lantern Security
…
continue reading
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
Welcome to The MLSecOps Podcast, presented by Protect AI. Here we explore the world of machine learning security operations, a.k.a., MLSecOps. From preventing attacks to navigating new AI regulations, we'll dive into the latest developments, strategies, and best practices with industry leaders and AI experts. Sit back, relax, and learn something new with us today. Learn more and get involved with the MLSecOps Community at https://bit.ly/MLSecOps.
…
continue reading
Welcome to the Bug Hunter Podcast by Pentesterland, a podcast for pentesters & bug bounty hunters. We tackle technical questions & inspirational topics to help you develop both a hacker skillset & mindset.
…
continue reading
A new independent Podcast focusing on all things IT Security, although with a SOC focus. From Incident Response, Pen Testing, Ransomware and Digital Forensics, through to hiring, certification and recruitment. Enjoy a mix of up-to-date commentary and guest interviews with a few laughs and stories along the way.
…
continue reading
Technology tips and insights to help protect your business! We offer weekly interviews with industry experts and leaders from companies like Coca-Cola, Verizon and AT&T to share their insights on cybersecurity and other technology topics. Join your host, Shaun St.Hill, the CEO of Tech and Main!
…
continue reading
It takes a lot to solve complex data problems securely. A sandbox is the perfect space to discover new approaches. In season two of Security Sandbox, Relativity CSO & CIO Amanda Fennell chats with guests about maximizing security's greatest asset—people—through meaningful use of technology and process, creative and compassionate training, and the conviction that there is room for taking risk in security.
…
continue reading
A podcast that explores the stories of real people, their work, and its impact on the information security industry. Join security expert Caroline Wong as she focuses on the human side of security. Don't forget to follow the podcast on Twitter: https://twitter.com/humansofinfosec
…
continue reading
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
…
continue reading
This Cyber Security podcast is intended to help people better protect themselves from Cyber criminals by offering quick tips, hacking news summaries and interviews with industry professionals. USB our Guest is the cyber security podcast you have been looking for. Offering quick tips and attack overviews 5-10 minutes in length intended to help people better protect themselves from Cyber criminals and 1-2hr interviews with industry professionals. From 2FA to Zero-Days and everything in between ...
…
continue reading

1
(replay) Common Pentest Findings That Shouldn't Exist in 2025
27:23
27:23
Play later
Play later
Lists
Like
Liked
27:23In this episode of The Cyber Threat Perspective, we highlight the pentest findings that, frankly, have no business showing up in 2025. From accounts with weak passwords and no MFA to plaintext credentials on file shares, we break down the common misconfigurations and oversights that attackers still abuse, despite years of seeing the same issues ove…
…
continue reading

1
#66 The #1 Thing That Makes Pentesting Fun (Not Stressful) ft. Trent Miller
37:36
37:36
Play later
Play later
Lists
Like
Liked
37:36In this episode of The Hacker’s Cache, I sit down with penetration tester and security researcher Trent Miller (AzureAD) to talk about the one thing that makes pentesting fun instead of stressful: genuine friendships and community. We discuss how learning from other hackers, sharing experiences, and joining groups like DEF CON DC608 can accelerate …
…
continue reading

1
7MS #695: Tales of Pentest Pwnage - Part 78
15:57
15:57
Play later
Play later
Lists
Like
Liked
15:57Today’s tale of pentest pwnage involves: Using mssqlkaren to dump sensitive goodies out of SCCM Using a specific fork of bloodhound to find machines I could force password resets on (warning: don’t do this in prod…read this!) Don’t forget to check out our weekly Tuesday TOOLSday – live every Tuesday at 10 a.m. over at 7MinSec.club!…
…
continue reading

1
Ep. 13 – nOAuth Account Misbinding & Assumed-Breach to Domain Admin (Season Finale)
15:09
15:09
Play later
Play later
Lists
Like
Liked
15:09One misbound identity. One exposed internal path. Two routes to total compromise. In this season finale of Hacked & Secured: Pentest Exploits & Mitigations, we break down two real-world findings that show how small trust assumptions can unravel entire systems: nOAuth (SSO account misbinding) — Multi-tenant SSO auto-linked accounts by email instead …
…
continue reading

1
Pentest & Scams | Latest Cybersecurity News: The Ciphered Reality Podcast by RITC Cybersecurity
44:01
44:01
Play later
Play later
Lists
Like
Liked
44:01In this episode of The Ciphered Reality Podcast, your hosts Mike & Mari unpack the latest online scams sweeping across countries and break down what penetration tests (PENTESTs) are? & why they’re critical in protecting your business from malicious actors. What you’ll learn in this episode: Why enterprises struggle to safeguard data in the age of A…
…
continue reading
In this episode, host Chris sits down with YuriyTsibere, Product Manager at ThreatLocker, to explore his journey from IT operations in Ukraine to leading cybersecurity product development. Yuriy shares how early curiosity in technology shaped his path toward buildingsecure and user-focused solutions. Together, they discuss the power of clear commun…
…
continue reading

1
Zero Trust Framework | Latest Cybersecurity News: The Ciphered Reality Podcast by RITC Cybersecurity
47:43
47:43
Play later
Play later
Lists
Like
Liked
47:43New Episode Alert! Dive into the latest episode of The Ciphered Reality Podcast by RITC Cybersecurity, where your favorite hosts Mike & Mari break down why adopting a Zero Trust framework is essential to cutting down security incidents across your enterprise. Stick around till the end as Mike & Mari unpack the hottest stories in Cybersecurity News,…
…
continue reading
In this episode, Spencer and Brad dig into a question that comes up all the time: what exactly is offensive security? Hint: it’s not just “pentesting.” Offensive security covers a whole spectrum of activities, including, penetration testing, red teaming, purple teaming, adversary emulation, and more. We’ll break down what each of these means, how t…
…
continue reading

1
#65 Why You Can’t Find a Job After Passing OSCP
38:40
38:40
Play later
Play later
Lists
Like
Liked
38:40Struggling to land a cybersecurity job after passing the OSCP? In this episode of The Hacker’s Cache, I break down why the OSCP certification alone isn’t enough to secure a penetration testing role. From the importance of starting in entry-level IT positions and gaining real-world technical experience, to building soft skills, showcasing work ethic…
…
continue reading

1
Social Engineering | Latest Cybersecurity News: The Ciphered Reality Podcast by RITC Cybersecurity
34:52
34:52
Play later
Play later
Lists
Like
Liked
34:52🎙️ Social Engineering: Latest Threats & Best Practices | RITC Cybersecurity Podcast Cyber attackers are no longer just exploiting systems — they’re exploiting people. In this episode, we dive deep into two fast-emerging social engineering tactics: 🔸 Ad-Tech Manipulation — How malicious actors are now buying legit ad space to target companies with m…
…
continue reading

1
Insider Threats | Latest Cybersecurity News: The Ciphered Reality Podcast by RITC Cybersecurity
43:39
43:39
Play later
Play later
Lists
Like
Liked
43:39INSIDER THREATS ARE EVOLVING ARE YOU READY? In this episode, Mike & Mari uncover two silent cyber killers lurking across MacOS, Windows, and Linux systems: ChillyHell MacOS Backdoor & Zynor RAT – A cross-platform menace slipping past traditional defenses. Salty 2FA & Phishing-as-a-Service (PhaaS) – Hackers are now outsourcing phishing like Uber rid…
…
continue reading

1
7MS #694: Tales of Pentest Pwnage – Part 77
33:11
33:11
Play later
Play later
Lists
Like
Liked
33:11Hey friends, today I talk about how fun it was two combine two cool pentest tactics, put them in a blender, and move from local admin to mid-tier system admin access (with full control over hundreds of systems)! The Tuesday TOOLSday video we did over at 7minsec.club will help bring this to life as well.…
…
continue reading

1
IVR Systems: The Ciphered Reality Podcast welcomes Steven from Newbridge Solutions - Part II
31:17
31:17
Play later
Play later
Lists
Like
Liked
31:17We’re back with Part II of The Ciphered Reality Podcast! Your hosts Mike and Mari continue their deep-dive conversation with Steven from Newbridge Solutions, expanding on the impact of AI and the evolution of IVR systems in today’s business world. In this follow-up episode, we go further into: Advanced ways AI-driven IVR systems personalize custome…
…
continue reading

1
Episode 151: Tool Time - PingCastle for Defenders
42:27
42:27
Play later
Play later
Lists
Like
Liked
42:27In this episode, we’re digging into a super awesome Active Directory security tool called PingCastle. We’ll cover what it is, why it matters for Active Directory security, and how IT and security teams can leverage it to get ahead of adversaries. PingCastle is a staple tool on our internal pentesting toolbelt. In this episode, you will find out why…
…
continue reading

1
#64 Job Interview Secrets From the Other Side of the Table ft. Vladimir Ichkov
37:09
37:09
Play later
Play later
Lists
Like
Liked
37:09Senior penetration tester Vladimir Ichkov shares what really matters in cybersecurity job interviews from the perspective of both a candidate and an interviewer. We discuss the role of soft skills, confidence, and humor in landing a pentesting job, common red flags that turn interviewers away, and how technical experience as a system administrator …
…
continue reading
The capstone week brings together all prior concepts, emphasizing integration as the defining quality of resilient design. Students learn that resilience arises not from isolated tools but from coherent architectures that link cryptography, identity, networks, applications, and supply chains into a unified strategy. Frameworks such as NIST CSF, ISO…
…
continue reading
This week addresses the rapidly evolving threat landscape. Ransomware is studied from its early origins to its present role as a multimillion-dollar business model, while advanced persistent threats demonstrate the persistence and adaptability of state-sponsored actors. Insider threats add complexity, highlighting the difficulty of defending agains…
…
continue reading
Applications and APIs form the backbone of digital services, enabling everything from online banking to global supply chains. Students study common weaknesses cataloged in the OWASP Top 10, including injection, misconfiguration, and weak session management, as well as the specific risks of mobile and API security. Case studies of T-Mobile and Pelot…
…
continue reading

1
Infrastructure, Cloud, and Supply Chain Security
21:58
21:58
Play later
Play later
Lists
Like
Liked
21:58Modern infrastructure has evolved from physical servers to cloud-native platforms, redefining both opportunities and risks. Students explore Infrastructure as Code, continuous integration and delivery, and the challenges of configuration drift. Case studies of pipeline compromises show how trusted automation can be weaponized, with vulnerabilities …
…
continue reading
This week highlights the role of architecture as the skeleton of security. Students learn how flat networks and perimeter-based models have failed under modern conditions, with the Target breach serving as a cautionary case. Defense in depth, segmentation, and microsegmentation are introduced as structural strategies for containing adversaries. The…
…
continue reading

1
Identity, Authentication, and Access Control
23:59
23:59
Play later
Play later
Lists
Like
Liked
23:59With the dissolution of traditional network perimeters, identity has emerged as the central gatekeeper of enterprise security. This week explores authentication, authorization, and access control as critical building blocks of trust. Students examine the weaknesses of passwords, the rise of multi-factor authentication, and the push toward passwordl…
…
continue reading
Cryptography serves as the scientific bedrock of confidentiality, authenticity, and integrity. Students will explore both symmetric and asymmetric encryption, comparing their respective strengths in performance and distribution. Hashing, digital signatures, and message authentication codes are introduced as complementary tools that secure modern tr…
…
continue reading

1
Security Foundations & Risk in the Modern Enterprise
25:48
25:48
Play later
Play later
Lists
Like
Liked
25:48This week introduces security as a foundational discipline rather than a collection of scattered tools. Learners will examine the enduring concepts of confidentiality, integrity, and availability, understanding how these principles anchor defenses across decades of technological change. The CIA triad is presented as a lens through which design choi…
…
continue reading

1
IVR Systems & Impact of AI: The Ciphered Reality Podcast welcomes Steven from Newbridge Solutions
24:42
24:42
Play later
Play later
Lists
Like
Liked
24:42Join us on the latest episode of The Ciphered Reality Podcast, where your hosts Mike and Mari sit down with Steven from Newbridge Solutions to explore the impact of AI and the future of evolving IVR systems. In this episode, we unpack: How dynamically adapting IVR systems transform customer experience The direct impact on business toplines and grow…
…
continue reading

1
7MS #693: Pwning Ninja Hacker Academy – Part 3
28:44
28:44
Play later
Play later
Lists
Like
Liked
28:44This week your pal and mine Joe “The Machine” Skeen kept picking away at pwning Ninja Hacker Academy. To review where we’ve been in parts 1 and 2: We found a SQL injection on a box called SQL, got a privileged Sliver beacon on it, and dumped mimikatz info From that dump, we used the SQL box hash to do a BloodHound run, which revealed that we had ex…
…
continue reading

1
Episode 150: How to Use Pentest Findings to Justify Your Next Security Spend
30:36
30:36
Play later
Play later
Lists
Like
Liked
30:36https://offsec.blog/budget In this episode, we’re tackling an often-overlooked opportunity: using pentest results to secure more budget for security initiatives. Too many organizations run a pentest, file the report away, and move on without leveraging it for strategic value. We’ll break down how to translate findings into business language, influe…
…
continue reading

1
Ransomware Protection & Latest Cybersecurity News: The Ciphered Reality Podcast
43:04
43:04
Play later
Play later
Lists
Like
Liked
43:04Join us on the latest episode of the Ciphered Reality Podcast where your favourite hosts Mike & Mari do a deep dive on a topic that concerns almost all of us: Ransomware Protection. How to stay safe online where malicious threat actors lurk on every corner? Identifying & Staying Safe with ever-evolving AI Landscape. Tune in for an insightful episod…
…
continue reading

1
University Security & Latest Cybersecurity News: The Ciphered Reality Podcast
35:39
35:39
Play later
Play later
Lists
Like
Liked
35:39Join us on the latest episode of the Ciphered Reality Podcast where your favourite hosts Mike & Mari do a deep dive on a topic that concerns almost all of us: University Security. How to stay safe online where malicious threat actors lurk on every corner? Identifying & understanding more about how malware is offered as a service online. Tune in for…
…
continue reading

1
Student & Parent Cyberawareness | Copyright Phishing Lures - The Ciphered Reality Podcast
33:25
33:25
Play later
Play later
Lists
Like
Liked
33:25Join us on the latest episode of the Ciphered Reality Podcast where your favourite hosts Mike & Mari do a deep dive on a topic that concerns almost all of us: Student & Parent Cyberawareness. How to stay safe online where malicious threat actors lurk on every corner? Identifying & Staying Safe from the latest malware expanding through copyright phi…
…
continue reading

1
#63 Q&A: Outwork 1,000 Applicants to Break Into Cybersecurity
35:17
35:17
Play later
Play later
Lists
Like
Liked
35:17Breaking into cybersecurity isn’t about being “good enough.” It’s about outworking the 1,000 other applicants fighting for the same job. In this episode of The Hacker’s Cache podcast, I share the raw truth about competing in today’s cybersecurity job market, why certifications and hands-on projects matter more than ever, and how to stand out when e…
…
continue reading

1
7MS #692: Tales of Pentest Pwnage – Part 76
32:45
32:45
Play later
Play later
Lists
Like
Liked
32:45Happy Friday! Today’s another hot pile of pentest pwnage. To make it easy on myself I’m going to share the whole narrative that I wrote up for someone else: I was on a pentest where a DA account would sweep the networks every few minutes over SMB and hit my box. But SMB signing was on literally everywhere. The fine folks here recommended I try rela…
…
continue reading

1
Episode 149: Building a Security Stack That Works A Practitioner’s Perspective
36:33
36:33
Play later
Play later
Lists
Like
Liked
36:33In this episode, Brad and Spencer sit down with an experienced information security and risk manager to explore how they build and manage their security stack, choose the right tools, and win support from their team and leadership. We dig into the balance between technical defenses and business-driven risk management, from budgeting and vendor sele…
…
continue reading
"Revelation" is about exposing what’s hidden: Vulnerabilities, Truths, and the role of hackers in revealing them.In this conversation, Casey John Ellis, founder of Bugcrowd, shares his journey from a curious child fascinated by technology to a pioneer in crowdsourced security. He discusses the evolution of bug bounty programs, the importance of com…
…
continue reading

1
#62 Is InfoSec Slowing Down? Threat Models Explained ft. Carl Vincent (vyrus)
39:49
39:49
Play later
Play later
Lists
Like
Liked
39:49In this episode of The Hacker’s Cache, Kyser Clark sits down with Carl Vincent, better known as Vyrus, to unpack the shifting realities of cybersecurity. Carl shares straight talk on the Silver Bullet ecosystem that fraud actors rely on, why today’s cybercrime is more about account access than shell popping, and how blue teams can actually turn cri…
…
continue reading

1
7MS #691: Tales of Pentest Pwnage – Part 75
31:39
31:39
Play later
Play later
Lists
Like
Liked
31:39Holy schnikes, today might be my favorite tale of pentest pwnage ever. Do I say that almost every episode? yes. Do I mean it? Yes. Here are all the commands/links to supplement today’s episode: Got an SA account to a SQL server through Snaffler-ing With that SA account, I learned how to coerce Web auth from within a SQL shell – read more about that…
…
continue reading

1
Episode 148: Securing Windows: Common Misconfigurations That Give Attackers The Advantage
54:45
54:45
Play later
Play later
Lists
Like
Liked
54:45This is the webinar I gave in August 2025 on the topic of common Windows misconfigurations I see during internal pentests. Make sure you grab your free gifts! Learn how we do internal pentesting differently... https://securit360.com/free-gifts https://links.spenceralessi.com/creds https://go.spenceralessi.com/windows-slides Blog: https://offsec.blo…
…
continue reading

1
Incident Response Plans | Browsers as Cyber Battlegrounds & AI Security Risks – Ciphered Reality
52:55
52:55
Play later
Play later
Lists
Like
Liked
52:55Episode Overview: Your browser isn’t just for surfing the web anymore—it’s becoming the front line of cyber warfare. And when it comes to AI in security, remember: garbage in = garbage out. In this episode of the Ciphered Reality Podcast by RITC Cybersecurity, we break down: 🔹 The Browser Battleground – Why your browser is a prime target for attack…
…
continue reading

1
#61 How to Level Up Fast in Your First Cybersecurity Role ft. Ryan Daub
34:47
34:47
Play later
Play later
Lists
Like
Liked
34:47In this episode of The Hacker’s Cache, returning guest Ryan Daub shares his journey from IT support to offensive security and reveals practical advice on how to level up fast in your first cybersecurity role. We cover the importance of mastering fundamentals, documenting your work, learning from failures, and asking questions without fear. Ryan als…
…
continue reading

1
7MS #690: Tales of Pentest Pwnage – Part 74
21:13
21:13
Play later
Play later
Lists
Like
Liked
21:13Today’s tale of pentest pwnage is a classic case of “If your head is buried in the pentest sand, pop it out for a while, touch grass, and re-enumerate what you’ve already enumerated, because that can lead to absolute GOLD!”
…
continue reading