All Episodes
Cyberside Chats: Cybersecurity Insights from the Experts — 68 episodes
Security Debt: The Risk Nobody is Reporting
Claude Code Leak: What Security Leaders Need to Know About AI Coding Agents
The “Hacking Ray” Is Here: AI, Project Glasswing, and the End of Hidden Vulnerabilities
We don’t break in, we badge in
Stryker Attack Analysis: Cybersecurity and insurance perspectives
Mass Exploitation 2.0: Web Platforms Under Attack
Is Anthropic a Pentagon “Supply Chain Risk”?
Google Gemini Changed the Rules: Are Your API Keys Exposed?
Opus 4.6: Changing the Pace of Software Exploitation Description
Nancy Guthrie’s Recovered Footage: The Reality of Residual Data
Ransomware Gangs Are Teaming Up
Top Threat of 2026: The AI Visibility and Control Gap
The Verizon Outage and the Cost of Concentration
Data Is Hazardous Material: How Data Brokers Telematics and Over-Collection Are Reshaping Cyber Risk
Venezuela’s Blackout: Cybercrime Domino Effect
What the Epstein Files Teach Us About Redaction and AI
Amazon's Warning: The New Reality of Initial Access
AI Broke Trust: Identity Has to Step Up in 2026
The 5 New-ish Microsoft Security Features to Roll Out in 2026
The Extension That Spied on You: Inside ShadyPanda’s 7-Year Attack
Inside Jobs: How CrowdStrike, DigitalMint & Tesla Got Burned
Made in China—Hacked Everywhere?
Holiday Hackers—The 2025 AI Fraud Boom
LOUVRE Was the Password?! Cybersecurity Lessons from the Heist
Poisoned Search: How Hackers Turn Google Results into Backdoors
The AWS Outage and Hidden Fourth-Party Risks
Ransomware in the Fast Lane: Lessons from the Jaguar Land Rover Attack
The Power of “Why” – Communicating Cybersecurity Effectively
Shutdown Fallout: The Cybersecurity Information Sharing Act Expires
Inside the Spider’s Web: What Indictments Reveal About Scattered Spider
Vibe Hacking: The Dark Side of AI Coding
The Saga Continues: More Dirt on the Salesforce–Drift Breach
Connected App, Connected Risk: The Salesforce–Drift Incident
Betrayal, Backdoors, and Payback: When Hackers Become the Hacked
Printer Problems: Trump, Putin, and a Costly Mistake
Mass Salesforce Hacks: How Criminals Are Targeting the Cloud Supply Chain
North Korea’s Deepfake Remote Workers: How They’re Getting Inside U.S. Companies
The Amazon Q AI Hack: A Wake-Up Call for Developer Tool Security
Iran’s Cyber Surge: Attacks Intensify in 2025
Leaked and Loaded: DOGE’s API Key Crisis
Holiday Horror Stories: Why Hackers Love Long Weekends
Federal Cybersecurity Rollbacks: What Got Cut—And What Still Stands
No Lock, Just Leak
The AI Insider Threat: EchoLeak and the Rise of Zero-Click Exploits
When AI Goes Rogue: Blackmail, Shutdowns, and the Rise of High-Agency Machines
Retailgeddon Reloaded: Beyond Card Theft, Into Chaos
How Hackers Get In: Penetration Testing Secrets from the Front Line
Afterlife Access: Cybersecurity Planning for When You’re Gone
The LockBit Leak: When Hackers Get a Taste of Their Own Medicine
Network for Rent: The Criminal Market Built on Outdated Routers
Hacker AI: Smarter Attacks, Faster Exploits, Higher Stakes
Quantum Shift: How Cybersecurity Must Evolve Now
Red Alert: CISA's Budget Cuts and the Fallout for Defenders
23andMe: Breaches, Bankruptcy, and Security
"Unmasking Shadow IT: Navigating Unauthorized Communication Tools Like Signal"
The Encryption Battle: Security Savior or Cyber Risk?
Deepfakes & Voice Phishing: The New Frontier of Cybercrime
Wiretapped: How Hackers Infiltrated Global Telecom Networks
When Microsoft Goes Down: Cyber Risk & Resilience
Abandoned S3 Buckets – A Goldmine for Hackers
Ransomware Watch: Ghost, RansomHub, and the Latest Trends
Software Exploits – The Fast-Paced Threat Landscape of 2025
The OPM Security Debacle: Rogue Servers, Data Risks & What’s Next
DeepSeek or Deep Risk? The AI Power Play With China
The Silk Road, a Pardon, and the Future of Cybercrime
When the FBI Becomes Your IT Department
Cyber Trust or Bust? The New FTC Cyber Trust Mark
2025 Cybersecurity Priorities: The Top 3 Moves to Make