preloader
Episodes
Episode 80 - Psychology and Ransomware
Episode 79 - Mastering The Science Behind Social Engineering
Episode 78 - The 3 Root Causes of Ransomware
Episode 77 - Collecting Threat Intel For Good
Episode 76 - Automating Attack Surface Management
Episode75 - Jeff Man - From the NSA to PCI
Episode74 - Brett Johnson & Online Crime
Episode73 - Higinio Ochoa & Hacking with Anonymous
Episode72 - Nathan Sweaney & The Future of Privacy
Episode71 - Peter Taylor & Fraud Detection
Episode70 - Bob Diachenko & Hunting Open Databases
Episode69 - James Linton & The Email Prankster
Episode68 - Christian Espinosa & Tactical Communication
Episode67 - Evan Francen & Security Fundamentals
Episode66 - Matt Danner & Digital Forensics
Episode65 - Martina Dove PhD & The Psychology of Scams
Episode64 - Daniel Cuthbert & Pen Testing with the ASVS
Episode63 - Nico “Dutch_Osintguy” Dekens & Leveraging Telegram in OSINT
Episode62 - Alissa Knight & Hacking Cars
Episode61 - Robert Graham & Large Scale Port Scanning w/Masscan
Episode60 - AJ Yawn & Automating AWS Security
Episode59 - Tim Adams & DNS Filtering
Episode58 - Ryan Dewhurst & Securing WordPress
Episode57 - Ben Dowling & IP Geolocation
Episode56 - Assaf Dahan & Ransomware Trends
Episode55 - Charlie Belmer & NoSQL Injection
Episode54 - Jeff Foley & Asset Discovery with Amass
Episode53 - hashcat 101
Episode52 - InfoSec News & Analysis
Episode51 - Jim Manico & Developing Securely
Episode50 - pdp (Petko Petkov) & Automating Pownage with PownJS
Episode49 - Gabrielle Botbol & Becoming a Pen Tester
Episode48 - Paulino Calderón & Practical IoT Hacking
Episode47 - Christian Folini & The Core Rule Set
Episode46 - InfoSec News & Analysis
Episode45 - John Hammond & Hacking CTFs
Episode44 - Ted Harrington & Doing Application Security Right
Episode43 - Robert “RSnake” Hansen & The Future of Data Privacy
Episode42 - Charles Shirer & Pen Testing with No Money Down
Episode41 - Chris Hadnagy & Human Hacking
Episode40 - Fabio Viggiani & Supply Chain Attacks
Episode39 - Josh Sokol & Managing Risk Simply
Episode38 - Tyrone Wilson & Breaking Into the Security Industry
Episode37 - Jenny Radcliffe & People Hacking
Episode36 - Tracy Maleef & Empathy Based InfoSec
Episode35 - Ed Bellis & Risk Based Vulnerability Management
Episode34 - John Strand & Moving Beyond 0-Days
Episode33 - Tanya Janca & Coding Securely
Episode32 - Or Katz & Phishing Evasion Techniques
Episode31 - Chris Rock & Cyber Mercenaries
Episode30 - Hakluke & The Bug Bounty Mindset
Episode29 - Katie Moussouris & Running Bug Bounties
Episode28 - STÖK and Hunting Bug Bounties
Episode27 - Joona Hoikkala and Advanced FFuF Scanning
Episode26 - James Kettle and Becoming a Security Researcher
Episode25 - Jeremiah Grossman and Asset Inventory
Episode24 - Ira Winkler & How to Stop Stupid
Episode23 - Samy Kamkar & Reverse Engineering
Episode22 - Chris Kubecka & Hacking the World with OSINT
Episode21 - HD Moore & Advanced Asset Inventory Techniques
Episode20 - Robert Baptiste (Elliot Anderson) & Mobile App Hacking
Episode19 - Tommy Devoss (Dawgyg) & Bug Bounty Hunting on Steroids
Episode18 - Simon Bennetts & Headless Automated Scanning with ZAP
Episode17 - Matthias Wilson & Using OSINT Against Nigerian Scammers
Episode16 - Ty Miller & Security Automation
Episode15 - Chris Dale & Breaking up Recon from the Pen Test
Episode14 - Andrew van der Stock & the Future of OWASP
Episode13 - Advanced Passive Recon with the Amass Scripting Engine
Episode12 - Brute force more effectively with custom wordlists
Episode11 - Hacking from the command line with Bash and Vim
Episode10 - Server Side Request Forgery Attacks and Bypasses
Episode9 - Automating Recon - Mapping Your Target Effectively
Episode8 - Domain and Network Recon using Amass - Mapping the Attack Surface
Episode7 - GitHub Reconnaissance - Finding the needle in the Haystack
Episode6 - Hunting Open Elasticsearch Databases for Fun and Profit
Episode5 - Asset Inventory for Red Teamers and OSINT Investigators
Episode4 - Infosec News & Website Attribution
Episode3 - Infosec News & Reverse Image Search
Episode2 - InfoSec News & Cyber Attribution with Canary Tokens
Episode1 - Zoom Security Risks & Anonymous LinkedIn Searches