7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
…
continue reading
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics. [email protected]
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
Phillip Wylie interviews cybersecurity industry experts on offensive security and techniques around penetration testing and red teaming.
…
continue reading
Emergency Medicine Cases – Where the Experts Keep You in the Know. For show notes, quizzes, videos and more learning tools please visit emergencymedicinecases.com
…
continue reading
This podcast contains security topics discussed by the Secure Ideas LLC. team.
…
continue reading
With such countless organizations succumbing to cybercriminals attacks, organizations should go the additional mile to get internal and external web applications. Numerous organizations feel that vulnerability examines are sufficient for finding security failings in a web application. While vulnerability scans can feature known shortcomings, web application penetration testing shows you how well they would hold up in a true attack by unapproved or unauthorized clients.
…
continue reading
The CISO Signal is a true cybercrime podcast investigating the most consequential breaches, insider threats, takedowns, and nation-state hacks shaping today’s digital world. Each episode combines gripping, cinematic storytelling with exclusive interviews from top CISOs and cybersecurity leaders. Together, we break down how the world’s most dangerous cyberattacks unfolded and what today’s security professionals must learn from them. Whether you’re a Chief Information Security Officer, a secur ...
…
continue reading
Engineers consistently exclude non-technical people from understanding enough about technology to better utilise it. This is wrong! Engineers should be equipping non-technical people with enough of an understanding to make the right business decisions, without trying to drag them all the way down into the detail.
…
continue reading
Hacked Off demystifies the world of cybersecurity. Hosted by Secarma's Managing Director, Holly Grace Williams, it features weekly interviews delving beneath the headlines of the latest hacks, breaches and vulnerabilities, providing expert advice on how to stay safe online. This podcast is brought to you by global cybersecurity and penetration testing company, Secarma.
…
continue reading
My name is Alex Fergus, and I'm a health and technology geek providing in-depth, independent product reviews on the latest red light therapy devices. With over seven years of experience studying light therapy and having used and tested dozens of hundreds of light therapy products, you can be sure that I'll have a video to help you with your educational or product-buying needs. Test, review, compare, and study all things Red Light Therapy. Whether you're seeking out the best Red Light Body Pa ...
…
continue reading
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, develop ...
…
continue reading
a 360 aerial penetration entrance at the beginning of every episode (an inhuman erection)
…
continue reading
Felix explores Internet of Things (IoT) and Operational Technology cyber security. Perfect for project managers, developers, and those learning about penetration testing in this niche area. Email Felix using [email protected] Get more information at the website: yougottahackthat.com Find You Gotta Hack That on LinkedIn and X @gotta_hack
…
continue reading
Hack for Fun and Profit is a weekly podcast for anyone who is interested in ethical hacking. The topics include bug bounty hunting, penetration testing, red teaming and many more. Sit back and enjoy stories, tips and tricks that will inspire you. For subscription-only episodes, enroll using this link: https://anchor.fm/thehackerish/subscribe
…
continue reading
Since 2005, BlueHat has been where the security research community, and Microsoft, come together as peers; to debate, discuss, share, challenge, celebrate and learn. On The BlueHat Podcast, Microsoft and MSRC’s Nic Fillingham and Wendy Zenone will host conversations with researchers and industry leaders, both inside and outside of Microsoft, working to secure the planet’s technology and create a safer world for all.
…
continue reading
As cars become smarter and more connected, the demand for top-tier automotive cyber security has never been higher. With expert insights from PlaxidityX, a leading automotive cyber security company, we’ll guide you through the challenges and solutions protecting millions of vehicles worldwide. Whether you’re an industry expert or just curious about how cars are secured in the digital age, this podcast comprehensively looks at how cyber defenses are developed, tested, and deployed. We don’t j ...
…
continue reading
Tune in as our hosts answer questions from small business leaders! We will discuss real-world Information Security challenges faced by our callers and offer relevant advice and guidance.
…
continue reading
We think we know how computer systems work, but how come they keep surprising us? We also think we know how humans behave, but we keep finding out we don’t. This podcast is for ethical hackers who are thirsty for challenges and who never settle for easy answers. We challenge some of the best offensive security pros in the world to reveal the unique traits, skills, and real-world experiences that got them where they are today. Get ready to be caught off guard as we debunk misconceptions, diss ...
…
continue reading
The Build+Revitalize podcast is an outgrowth of SME’s passion and commitment to solving problems and building better communities. We are proud to be your go-to source for insights on challenges and emerging trends in the AEC industry. In each episode, we will be joined by our partners and friends for in-depth conversations on overcoming obstacles in the AEC industry, opportunities we offer professional engineering consultants and students, and emerging technologies that optimize how we work. ...
…
continue reading
On the front lines of technology and business there is a battle of survival. Behind the scenes, businesses are on a mission to keep a vigilant watch for threats in an ongoing Cyber War. But it’s not just about malware, ransomware, and breaches anymore. The obstacles and barriers companies face today are bigger and badder than ever — and these cyber threats are forcing them to prove they’re secure for the future. So when you need answers to win the battle, tune into Cyber Security America wit ...
…
continue reading
Taking the Fandoms you love and building worlds to play Dungeons and Dragons in. Homebrew Avengers, Percy Jackson & the Olympians, and Star Wars so far - what will we do next?
…
continue reading
The SecurityMetrics Podcast, hosted by Jen Stone (Principal Security Analyst, QSA, CISSP, CISA), will help you understand current data security and compliance trends. Each episode will feature a different security professional offering tips and security best practices.
…
continue reading
Podcast by CyberTalk
…
continue reading
Inspirational stories of black women in tech. Support this podcast: https://podcasters.spotify.com/pod/show/frauvis/support
…
continue reading
Ages ago, elves and dwarves unknowingly migrated between Universes via a Junction. Jenneva and Egam believe they have found a Junction and plan a trip with Alexander to test the theory and investigate the origins of the elves and dwarves. Because they believe that the perennial animosity between the two races is due to misunderstandings about their histories, the mages include the prince of elves and the prince of dwarves in the group. Trouble begins at the very start of the journey as Egam ...
…
continue reading
Blue Fox Group, a technology company that specializes in supporting customers with the best infrastructure, live support, and communications technology available. Supporting your business objectives and improving your bottom line.
…
continue reading
Hacker Talk brings you interesting conversation between some of the world best hackers, cyber security professionals and information security people.
…
continue reading
The one and only official podcast from OffSec, Inc. -- creators of the Kali OS, the OSCP certification, and the world's leading cybersecurity training
…
continue reading
Certify – CompTIA Security+ 701 Audio Course is your complete audio companion for mastering the CompTIA Security+ SY0-701 certification exam. Designed for aspiring cybersecurity professionals, this narrated series breaks down every domain of the official exam objectives with clarity, focus, and real-world context. Whether you’re commuting, exercising, or studying at home, each episode delivers concise, engaging, and exam-relevant content to help you pass with confidence. Created by cybersecu ...
…
continue reading

1
HACKED: Into the minds of Cybersecurity leaders
Talking cybersecurity with nexus IT Security group
We are giving an inside look into the minds of today's cybersecurity leaders and defining trends for the upcoming threat landscape, what’s top of mind for security leaders, and advise for security leaders and practitioners.
…
continue reading

1
Penetration Testing and Social Engineering: Insights from Steve Stasiukoni
56:49
56:49
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
56:49🎙 Inside the World of Cybersecurity with Steve Stasiukonis Tune in to the latest episode of Cyber Security America as we explore real-world solutions for defending against today's ever-evolving cyber threats. Our guest, Steve Stasiukonis, President of Secure Network Technologies, brings over 29 years of experience in penetration testing, informatio…
…
continue reading

1
7MS #695: Tales of Pentest Pwnage - Part 78
15:57
15:57
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
15:57Today’s tale of pentest pwnage involves: Using mssqlkaren to dump sensitive goodies out of SCCM Using a specific fork of bloodhound to find machines I could force password resets on (warning: don’t do this in prod…read this!) Don’t forget to check out our weekly Tuesday TOOLSday – live every Tuesday at 10 a.m. over at 7MinSec.club!…
…
continue reading

1
Episode 152: What is Offensive Security?
43:33
43:33
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
43:33In this episode, Spencer and Brad dig into a question that comes up all the time: what exactly is offensive security? Hint: it’s not just “pentesting.” Offensive security covers a whole spectrum of activities, including, penetration testing, red teaming, purple teaming, adversary emulation, and more. We’ll break down what each of these means, how t…
…
continue reading

1
Can Red Light Therapy Boost Fertility? Science Explained
30:19
30:19
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
30:19Send us a text Can red light therapy really improve fertility in both men and women? In this episode, Bart Wolbers sits down with Forrest Smith, CEO of Kineon, to discuss groundbreaking research and real-world results on how light therapy affects PCOS, endometriosis, testosterone levels, and sperm health. Show Notes Fertility challenges affect mill…
…
continue reading

1
Special Episode - SMB Security Awareness Training 2025
1:33:31
1:33:31
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
1:33:31The Mindful Business Security Show is a call-in radio style podcast for small business leaders. This time, Accidental CISO is joined by guest host Tailor Tolliver. Tailor is a cybersecurity consultant, fitness coach, and content creator with a passion for helping others succeed. In this special episode, they present a security awareness training se…
…
continue reading

1
Ep. 13 – nOAuth Account Misbinding & Assumed-Breach to Domain Admin (Season Finale)
15:09
15:09
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
15:09One misbound identity. One exposed internal path. Two routes to total compromise. In this season finale of Hacked & Secured: Pentest Exploits & Mitigations, we break down two real-world findings that show how small trust assumptions can unravel entire systems: nOAuth (SSO account misbinding) — Multi-tenant SSO auto-linked accounts by email instead …
…
continue reading

1
7MS #694: Tales of Pentest Pwnage – Part 77
33:11
33:11
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
33:11Hey friends, today I talk about how fun it was two combine two cool pentest tactics, put them in a blender, and move from local admin to mid-tier system admin access (with full control over hundreds of systems)! The Tuesday TOOLSday video we did over at 7minsec.club will help bring this to life as well.…
…
continue reading

1
Episode 151: Tool Time - PingCastle for Defenders
42:27
42:27
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
42:27In this episode, we’re digging into a super awesome Active Directory security tool called PingCastle. We’ll cover what it is, why it matters for Active Directory security, and how IT and security teams can leverage it to get ahead of adversaries. PingCastle is a staple tool on our internal pentesting toolbelt. In this episode, you will find out why…
…
continue reading

1
7MS #693: Pwning Ninja Hacker Academy – Part 3
28:44
28:44
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
28:44This week your pal and mine Joe “The Machine” Skeen kept picking away at pwning Ninja Hacker Academy. To review where we’ve been in parts 1 and 2: We found a SQL injection on a box called SQL, got a privileged Sliver beacon on it, and dumped mimikatz info From that dump, we used the SQL box hash to do a BloodHound run, which revealed that we had ex…
…
continue reading

1
Episode 150: How to Use Pentest Findings to Justify Your Next Security Spend
30:36
30:36
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
30:36https://offsec.blog/budget In this episode, we’re tackling an often-overlooked opportunity: using pentest results to secure more budget for security initiatives. Too many organizations run a pentest, file the report away, and move on without leveraging it for strategic value. We’ll break down how to translate findings into business language, influe…
…
continue reading

1
Ep 207 Sleep Strategies for Shift Work
1:21:04
1:21:04
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
1:21:04Discover evidence-based sleep strategies for shift workers. Optimize performance, recovery, and health with tips from sleep expert Dr. Michael Mak... If you find this beneficial please consider a donation to support EM Cases: https://emergencymedicinecases.com/donation/Dr. Anton Helman által
…
continue reading

1
7MS #692: Tales of Pentest Pwnage – Part 76
32:45
32:45
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
32:45Happy Friday! Today’s another hot pile of pentest pwnage. To make it easy on myself I’m going to share the whole narrative that I wrote up for someone else: I was on a pentest where a DA account would sweep the networks every few minutes over SMB and hit my box. But SMB signing was on literally everywhere. The fine folks here recommended I try rela…
…
continue reading

1
Episode 149: Building a Security Stack That Works A Practitioner’s Perspective
36:33
36:33
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
36:33In this episode, Brad and Spencer sit down with an experienced information security and risk manager to explore how they build and manage their security stack, choose the right tools, and win support from their team and leadership. We dig into the balance between technical defenses and business-driven risk management, from budgeting and vendor sele…
…
continue reading

1
Episode 074 - Step into a Cybersecurity Time Machine - Jeff Man
29:50
29:50
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
29:50Step into a Cybersecurity Time Machine - Jeff Man Cybersecurity strategy is not the same as it was 40 years ago. In this episode, Jeff Man, Sr. Information Security Consultant at OBS, joins host Nabil Hannan to discuss his extensive career in cybersecurity. They explore Jeff’s invention of the cryptologic cipher wheel, becoming an expert in securit…
…
continue reading

1
Defense Contractors: CMMC Is Here — And the Clock Is Ticking
29:34
29:34
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
29:34In our latest Cybersecurity America episode (42), I had the privilege of speaking with Jim Goepel, a true leader in cybersecurity and compliance — and someone who has helped shape the very ecosystem he now advises. Jim is the CEO of Fathom Cyber, a consulting firm in North Wales, PA specializing in: 🔹 CMMC assessment preparation 🔹 CUI education and…
…
continue reading

1
7MS #691: Tales of Pentest Pwnage – Part 75
31:39
31:39
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
31:39Holy schnikes, today might be my favorite tale of pentest pwnage ever. Do I say that almost every episode? yes. Do I mean it? Yes. Here are all the commands/links to supplement today’s episode: Got an SA account to a SQL server through Snaffler-ing With that SA account, I learned how to coerce Web auth from within a SQL shell – read more about that…
…
continue reading

1
Episode 148: Securing Windows: Common Misconfigurations That Give Attackers The Advantage
54:45
54:45
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
54:45This is the webinar I gave in August 2025 on the topic of common Windows misconfigurations I see during internal pentests. Make sure you grab your free gifts! Learn how we do internal pentesting differently... https://securit360.com/free-gifts https://links.spenceralessi.com/creds https://go.spenceralessi.com/windows-slides Blog: https://offsec.blo…
…
continue reading

1
The Sony Hollywood Hack | How Cybercrime Turned A Blockbuster Comedy Into A Global News Story
30:41
30:41
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
30:41THE SONY HACK: HOLLYWOOD, NORTH KOREA & THE CYBER WAR THAT CHANGED EVERYTHING In 2014, Sony Pictures became ground zero for the first major nation-state cyberattack on a global corporation. The “Guardians of Peace,” linked to North Korea, crippled Sony’s networks, leaked unreleased films, and exposed troves of executive emails that forced high-leve…
…
continue reading

1
7MS #690: Tales of Pentest Pwnage – Part 74
21:13
21:13
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
21:13Today’s tale of pentest pwnage is a classic case of “If your head is buried in the pentest sand, pop it out for a while, touch grass, and re-enumerate what you’ve already enumerated, because that can lead to absolute GOLD!”
…
continue reading

1
Episode 147: When to Accept the Risk
39:02
39:02
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
39:02In this episode, we’re digging into one of the most overlooked parts of a penetration test, when it actually makes sense to not fix a finding. Not every vulnerability deserves equal treatment, and sometimes accepting the risk is the most mature decision a business can make. We’ll cover how to recognize those situations, avoid common pitfalls, and d…
…
continue reading

1
Ep. 12 – Timing Attacks & Mobile OAuth Hijack: When Microseconds and Misflows Betray You
14:09
14:09
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
14:09A few microseconds. One silent browser session. That’s all it took for attackers to break into systems without tripping a single alert. In this episode of Hacked & Secured: Pentest Exploits & Mitigations, we explore two subtle but devastating flaws: 🔹 Timing Attacks for Token Leaks – By measuring microsecond delays, attackers were able to recover s…
…
continue reading

1
EM Quick Hits 67 Tick Borne Illness Update, Pediatric ECG Interpretation, Nailbed Repair, Closed Loop Communication, ESRD, Leaders in EM Dr. Catherine Varner
1:00:21
1:00:21
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
1:00:21On this EM Quick Hits podcast: Tick Borne Illness Update with Dr. Issac Bogoch, Pediatric ECG Interpretation with Dr. Kathleen Stephanos, Nailbed Repair with Dr. Matthew McArther, Closed Loop Communication with Dr. Shawn Segeren, ESRD with Dr. Brit Long, Leaders in EM Dr. Catherine Varner... Please consider donating to EM Cases here: https://emerge…
…
continue reading

1
SIN CITY CYBERATTACK | Inside MGM Casino's $100M Hack
30:20
30:20
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
30:20SIN CITY CYBERATTACK: INSIDE THE MGM & CAESARS CASINO BREACHES In September 2023, Las Vegas turned into ground zero for one of the most disruptive cyberattacks in U.S. history. MGM Resorts, owner of iconic casinos on the Strip, saw slot machines go dark, hotel check-ins grind to a halt, and operations paralyzed for days. At the same time, Caesars E…
…
continue reading

1
7MS #689: Pwning Ninja Hacker Academy – Part 2
15:40
15:40
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
15:40Hello friends! Today your friend and mine, Joe “The Machine” Skeen joins me as we keep chipping away at pwning Ninja Hacker Academy! Today’s pwnage includes: “Upgrading” our Sliver C2 connection to a full system shell using PrintSpoofer! Abusing nanodump to do an lsass minidump….and find our first cred. Analyzing BloodHound data to find (and own) e…
…
continue reading

1
Episode 146: What Are the Security Implications of AI?
45:09
45:09
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
45:09In this episode of The Cyber Threat Perspective, we’re exploring the broader security implications of artificial intelligence. AI is transforming everything—from how we defend our networks to how attackers exploit them. We’ll break down the risks, the opportunities, and what security teams need to be thinking about right now as AI becomes embedded …
…
continue reading

1
Security prioritization, road mapping, and ROI in small businesses
1:06:44
1:06:44
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
1:06:44The Mindful Business Security Show is a call-in radio style podcast for small business leaders. Join our hosts as they take questions from business leaders like you! This time, Accidental CISO is joined by guest host Kevin Jackson. Kevin is another long-time industry veteran with experience in both the government and private sectors. He's a former …
…
continue reading

1
From Combat Boots to Cybersecurity - Nia Luckey on her journey
53:08
53:08
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
53:08In this episode of the Cybersecurity America Podcast, sponsored by DarkStack7, host Joshua Nicholson sits down with Nia Luckey — Army veteran, published author, and cybersecurity leader — to talk about her powerful journey from military service to the frontlines of cyber defense. Nia shares lessons on resilience, leadership, and transitioning from …
…
continue reading

1
Hacking Smarter with Tyler Ramsbey
44:14
44:14
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
44:14In this episode of Simply Offensive, Phillip Wylie is joined by Tyler Ramsbey, a penetration tester and content creator. Learn about Tyler's unique journey into cybersecurity, the importance of soft skills, and the value of teaching and content creation. Tyler shares insights on maintaining mental health, balancing family life, and his upcoming ven…
…
continue reading

1
7MS #688: Building a Pentest Training Course Is Fun and Frustrating
22:13
22:13
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
22:13Today I talk about a subject I love while also driving me crazy at the same time: building a pentest training course! Specifically, I dissect a fun/frustrating GPO attack that I need to build very carefully so that every student can pwn it while also not breaking the domain for everybody else. I also talk about how three different flavors of AI fai…
…
continue reading

1
INSIDE CNA's $40M BITCOIN RANSOM | The Hack That Changed Cybersecurity
49:55
49:55
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
49:55The CISO Signal | INSIDE CNA's $40M BITCOIN RANSOM | The Hack That Changed Cybersecurity - EP 4 In this episode of The CISO Signal, we go deep inside the cyberattack that shook the financial world. Join us as we unravel the haunting details of the 2021 ransomware attack on CNA Financial, which resulted in a record-breaking $40 million ransom paymen…
…
continue reading

1
Episode 145: What To Do Minute 1 When Incident Response Arrives
33:46
33:46
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
33:46In this episode, we're diving into what to do the minute incident response arrives. That first moment matters—a lot. Whether it's a ransomware attack, unauthorized access, or data exfiltration, how you act in minute one can either help or hinder the investigation. We’ll cover the do’s, don’ts, and common mistakes we see, so you’re ready when the he…
…
continue reading

1
Cybersecurity’s Golden Rule: The Legal Blueprint No One Shares
48:07
48:07
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
48:07In this episode, sponsored by Darkstack7, Joshua sits down with Chris Cronin, partner at Halock Security Labs and founding partner of Reasonable Risk, to explore the intersection of cybersecurity, risk management, and the legal principles behind “reasonable” safeguards. Chris unpacks the DoCRA Standard and CIS RAM, sharing how historical and legal …
…
continue reading