『Cyber Distortion Podcast Series』のカバーアート

Cyber Distortion Podcast Series

Cyber Distortion Podcast Series

著者: Jason Popillion and Kevin Pentecost
無料で聴く

今ならプレミアムプランが3カ月 月額99円

2026年5月12日まで。4か月目以降は月額1,500円で自動更新します。

概要

Jason and Kevin, seasoned Cyber Security professionals, explain cyber security concepts that everyone needs to know in simple terms. They will leave you with practical takeaways you can use to keep yourself and your organizations safe. Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as a Information Security Manager for a Manufacturing company.Cyber Distortion Podcast, LLC. 政治・政府
エピソード
  • S5 - Episode 004 – Ashley Madison: Infidelity Unmasked
    2026/05/01

    In 2015, a shadowy group calling themselves "The Impact Team" detonated one of the most explosive data breaches in history—targeting Ashley Madison, a platform built on secrecy with a promise that "Life is short. Have an affair." What they exposed wasn't just a user database—it was a global ledger of private desires, hidden identities, and intimate conversations. Names, emails, locations, financial records… all spilled into the open. Careers unraveled. Relationships collapsed. And for some, the fallout was far more permanent.

    In this episode of Cyber Distortion, we break down how the breach happened, what the attackers were really after, and why the platform's own design—data retention, weak protections, and misleading "delete" features—made millions of people vulnerable. From credential stuffing and poor hashing practices to the ethics of publishing stolen data, this is a story about what happens when privacy is treated as a product rather than a right.

    But the real impact goes deeper. The Ashley Madison hack exposed a harsh truth about the modern internet: your most personal data isn't just stored—it's commoditized, retained, and often far less secure than you're led to believe. In a world driven by data, what happens when the things you thought were private become permanent?

    Join Kevin and Jason as they discuss the event in full detail!

    Resources

    MUST-READ BOOKS & DEEP DIVES

    1. The Ashley Madison Affair — Brian Krebs

    A detailed investigative look from one of the most respected voices in cybersecurity.
    🔗 https://krebsonsecurity.com/tag/ashley-madison/

    2. Data and Goliath — Bruce Schneier

    Not specific to Ashley Madison, but essential for understanding how personal data is collected, stored, and exposed at scale.
    🔗 https://www.schneier.com/books/data-and-goliath/

    3. Future Crimes — Marc Goodman

    Explores how cybercrime evolves and why breaches like Ashley Madison are becoming more common—and more damaging.
    🔗 https://www.futurecrimesbook.com/

    DOCUMENTARY

    Ashley Madison: Sex, Lies & Cyber Attacks

    A direct, narrative-driven look at the breach, the victims, and the aftermath.
    🔗 https://www.imdb.com/title/tt6104804/

    ADDITIONAL RESEARCH & REPORTING

    Krebs on Security — Original Coverage

    🔗 https://krebsonsecurity.com/2015/07/online-cheating-site-ashley-madison-hacked/

    WIRED — Deep Technical & Cultural Analysis

    🔗 https://www.wired.com/story/ashley-madison-hack/

    The Guardian — Timeline & Fallout

    🔗 https://www.theguardian.com/technology/ashley-madison

    Audio

    • Criminal
    • Electronic Vortex
    • Atmospheric Intense Teaser 0_56
    • Phonk Powerful Dope
    • Dark Day-AI Music
    • Enigma
    • Suspicious Atmosphere

    Provided by:

    Filmora, Audiostock and Universal Music for Creators

    続きを読む 一部表示
    41 分
  • S5 - Episode 003 – Stuxnet: Zero-Day Cataclysmic Warfare
    2026/04/15

    Cyber Distortion Podcast – Hosted by Kevin Pentecost & Jason Popillion

    In this episode of the Cyber Distortion Podcast, Kevin and Jason discuss one of the most chilling and groundbreaking cyberattacks in history: Stuxnet. What started as a mysterious series of system failures inside Iran's nuclear facilities quickly unraveled into something far more dangerous—a precision-engineered digital weapon designed not just to spy, but to destroy.

    We break down how Stuxnet infiltrated highly secure, air-gapped systems, silently manipulated industrial controls, and physically sabotaged centrifuges—all while reporting normal operations back to engineers. This wasn't just malware. It was a turning point.

    From its suspected origins to its global implications, we explore how Stuxnet redefined modern warfare, blurred the lines between cyber and kinetic attacks, and opened the door to a new era where code can cause real-world devastation.

    If cyberwarfare once sounded like science fiction… this is the moment it became reality.

    Tune in as we unpack the virus that changed everything.

    Resources

    Books (Best Deep Dives)

    • Countdown to Zero Day – Kim Zetter
      Probably the definitive Stuxnet book. It reads like a thriller but is deeply researched—covering the discovery, the zero-days, and the geopolitical backstory.
    • Sandworm – Andy Greenberg
      Broader than Stuxnet, but essential for understanding what came after. Shows how Stuxnet inspired a new wave of cyberwarfare (especially from Russia).

    Articles & Investigative Reporting

    • Wired (Kim Zetter's reporting)
      Some of the earliest and most detailed public reporting on Stuxnet came from Wired—great for narrative storytelling angles.
    • The New York Times – "Olympic Games" coverage
      Explores the alleged U.S. and Israeli involvement in the operation behind Stuxnet.

    Podcasts (For Tone & Inspiration)

    • Darknet Diaries – Episode: "Stuxnet"
      One of the best audio retellings—excellent pacing and storytelling that could inspire your own delivery style.
    • Malicious Life
      Goes deeper into the technical mechanics and broader cyberwar implications.

    Documentaries & Video

    • Zero Days
      A must-watch. Blends interviews, dramatization, and investigative journalism to explore both the technical and political sides.
    • YouTube channels like Kurzgesagt or Real Engineering occasionally touch on cyberwarfare concepts that help contextualize attacks like Stuxnet.

    Technical & Cybersecurity Analysis

    • Symantec (now part of Broadcom)
      Their original breakdown of Stuxnet is legendary—deep dive into how it actually worked.
    • Kaspersky Lab
      Offers detailed technical analysis and timelines of the worm's evolution.

    Audio

    - Suspicious Atmosphere

    - Trauma

    - Enigma

    - Dark Day AI Music

    - The Crisis of Islam 228S

    - The Crisis of Islam 230S

    - Cyberpunk Hacker Loop

    - True Crime Investigation

    - The Truth is Here

    Provided by Filmora

    - Splatter Horror Silence 01

    - Social Crisis

    Provided by: Audiostock



    - A Sinister Plot 1285
    Provided by: Universal Music for Creators

    続きを読む 一部表示
    34 分
  • S5 - Episode 002 – Cicada 3301
    2026/03/26

    Cyber Distortion Podcast – Hosted by Kevin Pentecost & Jason Popillion

    In January 2012, a mysterious message appeared on an obscure corner of the internet — a simple image posted on 4chan with a chilling promise: "We are looking for highly intelligent individuals." What followed was unlike anything the internet had ever seen.

    Hidden messages. Impossible riddles. Cryptographic puzzles buried in images, music files, and code. Clues scattered across the globe — from obscure websites to real-world posters taped to telephone poles in cities thousands of miles apart. Behind it all was a name that would become internet legend: Cicada 3301.

    In this episode of The Cyber Distortion Podcast, we dive deep into one of the most enigmatic puzzles ever unleashed online. Was Cicada 3301 a recruitment program for intelligence agencies? A secret society searching for elite cryptographers? Or an elaborate experiment designed to test the limits of human intelligence and collaboration?

    Join Kevin Pentecost and Jason Popillion, bringing over 50 years of combined cybersecurity experience, as they:

    • Break down how the Cicada puzzles pushed the boundaries of cryptography and problem-solving
    • Explore the hidden techniques used — from steganography to advanced encryption
    • Investigate the theories surrounding who might have been behind the mysterious organization
    • And uncover why, more than a decade later, the true purpose of Cicada 3301 remains unsolved

    This isn't just a story about puzzles — it's a journey into the strange intersection of cybersecurity, internet culture, and human curiosity. A digital scavenger hunt so complex that only a handful of people in the world were able to follow it to the end… and even they still don't fully understand who was waiting at the finish line.

    Are you ready to follow the clues?

    Resources

    Explore the Actual Puzzle Archive

    If your listeners want to see the real puzzle files and clues, this is one of the best archives online:

    • Complete Cicada 3301 Archive (GitHub)

    This repository contains:

    • Original images used in the puzzles
    • Clues from 2012, 2013, and 2014 puzzles
    • Hidden files extracted from the images
    • Documentation from the community of solvers

    The puzzles first appeared in 2012 on 4chan, challenging users to uncover hidden messages embedded in images and code.

    Audio

    - Suspicious Atmosphere

    - Cyberpunk Hacker Loop

    - True Crime Investigation

    - The Truth is Here

    Provided by Filmora

    - Splatter Horror Silence 01

    - Social Crisis

    Provided by: Audiostock



    - A Sinister Plot 1285
    Provided by: Universal Music for Creators 🎧

    続きを読む 一部表示
    44 分
adbl_web_anon_alc_button_suppression_c
まだレビューはありません