Crying Out Cloud cover art

All Episodes

Crying Out Cloud — 60 episodes

#
Title
1

Hacking GitHub with a Semicolon & Claude with Sagi Tzadik

2

Protecting Vibe Coded Apps and the Shift to "Soft Guardrails" with Igor Andriushchenko

3

Neuroscience, AI Research & Hiring Swifties with Alon Schindel

4

Hacking Moltbook with Gal Nagli

5

CodeBreach: Hijacking the AWS Console with Yuval Avrahami

6

React2Shell, Shai-Hulud 2.0, Gogs Zero-Day & Tika RCE

7

Live Talk: Security Minds from Google Cloud, AWS & Wiz

8

Cloud Detection Engineering, AI in the SOC and Parallel Parking with Alex Hurtado

9

VSCode Extension Secrets, RediShell, & Living-off-the-LLM

10

eBPF, Fishy Book Covers, and Open Source Security with Liz Rice

11

Security Metrics, Detection & Response & Paintball with Erik Bloch

12

Adversary Emulation, Cyber Education & Community Building with Day Johnson

13

Live Talk: Security Minds from Riot Games, Microsoft & Wiz

14

AI Double Agents to Blame, Scattered Spider Pivots to Planes

15

Pyramid of Pain, PEAK, and Bagpipes with David Bianco

16

AI-powered Security, Shared Fate, and an Archery Lesson with Dr. Anton Chuvakin

17

UK Retail Breaches, SAP 0day, and CVE Troubles

18

Bug Bounty Secrets, Hacker Communities, and a Hit of Volleyball with Justin Gardner

19

Quadruple Supply Chain Attack, IngressNightmare Exploited, and Rumors Abound

20

Ingress Nightmare: How a Single Request Could Take Over Your K8s Cluster

21

From Hotmail Hacks to AI hype, CTFs & Cloud Guardian: with Ashish Rajan

22

HACKERS ARE HIJACKING CLOUD KEYS: The Rise of Cloud-Native Ransomware

23

Norwegian Cloud Security, Open Source Tools, and Financial Sector Risks with Karim El-Melhaoui

24

DeepSeek Data Leak with Gal Nagli (Wiz Research)

25

Co-Founding Wiz, R&D and Security Leadership with Roy Reznik

26

post:Invent with Scott Piper (re:Invent digest)

27

Red Team Tactics with EA’s Johann Rehberger

28

Canadian Cybersecurity, Open Source Risks, and AppSec Insights with Tanya Janca

29

Hybrid Cloud Attacks, Linux Malware, and LLMJacking Exposed

30

AI Toolkit Risks, CUPS Vulnerabilities, and Google's Infostealer Defenses

31

From NASA to GitLab: Democratizing Security, Open Source, and Empowering Women – With: Julie Davila

32

Azure DDoS, Certificate Revocations, and ESXi Ransomware

33

Navigating Hyper Growth, AI Impact, and Mandiant Memories - Special Guest: Ryan Kazanciyan

34

SAPwned: SAP AI Core vulnerabilities - Special Guest: Hillai Ben-Sasson

35

CROC Talks - Securing DBs, Cloud Threat Intel, and Detection- Special Guest: Snowflakes’ Haider Dost

36

CROC News: Firewall Fumbles, Gitloker Etiquette, and Private Cloud Compute

37

CROC Talks: RCE Vulnerability in Ollama explained

38

CROC Talks: Chief Llama Officer and IBM CISO - Jerry Bell

39

CROC News: Ninjas, Grand Theft AI, and Backlogged CVEs

40

CROC Talks - Threat Models, Cloud Tools, and Security Tales - Special Guest: Kat Traxler

41

CROC Talks: Helping Secure Hugging Face Hub - Special Guest: Shir Tamari

42

CROC News - XZ Utils backdoor explained

43

CROC News: Malicious Repos, Bandwidth Theft, & NVD or NoVD?

44

CROC Talks: Bug Bounty Hunting & Pen Testing with Sam Curry

45

CROC News: Automotive Code Leak & Midnight Blizzard's Heist

46

#15 - Yinon Costica on AI risks, the importance of positivity and his new year's resolutions

47

#14 - On Executive Orders And AI (Special Guest - Chris Hughes)

48

#13 - Leaky CLIs, glitchy CPUs and risky HARs

49

#12 - Chomping at the Bits with Chompie

50

#11 - From SAS token to AI data exposure (with special guest - Hillai Ben-Sasson)

51

#10 - fwd:cloudsec With Special Guest Scott Piper

52

#9 - The collapse of LAPSUS$ and the risks of AI data poisoning

53

#8 - GameOverlay – privilege escalation vulnerabilities in Ubuntu

54

#7 - The Future Of The Cloud (Special Guest - Corey Quinn)

55

#6 - Chinese Spies Acquire Keys To The Azure Kingdom

56

#5 - MOVEit Transfer 0day vulnerabilities (Special Guest: Scott Piper)

57

#4 - Daisy Chain - A Double Supply Chain Attack

58

#3 - The BingBang Vulnerability (Special Guest: Ami Luttwak)

59

#2 - Hijacked Websites In China Redirect Traffic

60

#1 - CI/CD Supply Chain Attack