エピソード

  • AI cyber attacks need AI cyber defense: Ransomware's new danger and how a top expert is fighting back
    2025/09/23

    Everyone's using AI, including ransomware gangs. Podcast guest Karin Lagziel, Director Cybersecurity at consulting firm Sygnia, gives us the news and her cyber defense strategies for fighting back: With more AI, as well as a focus on fundamentals.

    In this episode:

    🔹 The first AI-powered ransomware "Prompt Lock" discovered in the wild
    🔹 How Chinese hackers created "Villager" - the AI version of Cobalt Strike
    🔹 Why traditional cybersecurity is failing against AI attacks
    🔹 How attackers weaponize your own AI against you
    🔹 The dark web's "AI as a Service" marketplace
    🔹 Real-time deep fakes so realistic they fool security experts
    🔹 AI governance frameworks
    🔹 Why every organization needs agentic AI for defense
    🔹 The future of cybersecurity careers (spoiler: humans aren't going away)

    Guest info: Karin Lagziel

    LinkedIn: https://www.linkedin.com/in/karinlags/
    Sygnia: https://sygnia.co


    How are you preparing for AI-enabled cyber attacks? Tell us in the comments. 👇

    続きを読む 一部表示
    58 分
  • Ep. 60: Crypto Kidnappings, Lost Keys, and Million-Dollar Bug Bounties
    2025/09/09

    Forbes 30 Under 30 cybersecurity expert Yevheniia Broshevan discusses crypto security challenges, bug bounty programs, and the reality that 95% of Bitcoin has been mined while 11-18% is lost forever.


    🔥 What You'll Learn:

    • The concerning trend in crypto losses hitting $3 billion this year alone
    • How bug bounties in Web3 can reach up to $10 million for critical vulnerabilities
    • How operational security failures cause more crypto thefts than code vulnerabilities
    • Why diversification is critical when storing digital assets
    • The reality behind crypto kidnappings
    • Real-world asset tokenization and the future of digital assetsKey management best practices


    🎯 Guest Spotlight:


    Yevheniia Broshevan – Co-Founder and CEO of Hacken, Forbes 30 Under 30 honoree, and Web3 security pioneer who has been active in crypto since 2014. Hacken, an end-to-end security and compliance partner for digital assets, has conducted security assessments for over 2,000 clients and operates a community of 50,000+ ethical hackers who have identified vulnerabilities worth millions.


    💡 Key Takeaways:

    • Access control issues and private key leakage cause majority of crypto hacks
    • Bug bounties in crypto can reach 5-10% of potential losses (millions in payouts)
    • Hardware wallets, diversification, and proper key management are essential
    • The industry lost $2.5 billion last year, $3 billion this year - trend is accelerating
    • Phishing and social engineering remain the weakest links in crypto security


    🚨 Critical Security Insights:


    From penetration testing blockchain protocols to smart contract audits, Yev reveals the hidden vulnerabilities that put billions at risk. Whether you're a crypto investor, security professional, or curious about Web3 technology, this conversation delivers actionable intelligence you can't afford to miss.


    💬 Comment: What's your biggest crypto security concern?


    Follow the Security Cocktail Hour podcast:

    • Website: https://securitycocktailhour.com
    • LinkedIn: https://www.linkedin.com/company/security-cocktail-hour/
    • Twitter/X: @SecCocktailHour
    • Instagram: https://www.instagram.com/seccocktailhour/


    Guest Links:

    • Yevheniia Broshevan LinkedIn: https://www.linkedin.com/in/broshevan/
    • Hacken: https://hacken.io


    #CryptoSecurity #Web3Security #Blockchain #Cybersecurity #DigitalAssets #SmartContracts #CryptoHacking #BugBounty #Web3 #SecurityPodcast #Forbes30Under30 #EthicalHacking #PenetrationTesting #CryptoWallet #KeyManagement #SecurityAudit #DeFi #Cryptocurrency

    続きを読む 一部表示
    1 時間 5 分
  • Ep. 59: WiFi Pineapple Unboxing: The Hacker Device From TV Shows!
    2025/08/18

    Ever wondered what that mysterious "WiFi Pineapple" device from hacker movies actually does? Today we're unboxing the Hak5 WiFi Pineapple Mark 7 - the real penetration testing tool that's been featured in countless TV shows and movies!


    🔥 What We Cover:

    • Complete unboxing of the WiFi Pineapple Mark 7
    • How hackers use this for man-in-the-middle attack
    • Why you should be worried about fake WiFi hotspots
    • Real-world scenarios where this could be deployed
    • Ethical penetration testing applications


    ⚠️ STAY SAFE: This video is for educational and ethical penetration testing purposes only. Always use these tools responsibly and only on networks you own or have explicit permission to test.


    For a discussion on these tools and the ethics of using them, listen to Episode 6: https://creators.spotify.com/pod/profile/security-cocktail-hour-po/episodes/Ep--6-Flipper-Zero-and-Other-Totally-Legit-Hacking-Tools-e2bsa4i


    For more unboxing videos of hacking and cybersecurity devices, check out this episode:


    https://creators.spotify.com/pod/profile/security-cocktail-hour-po/episodes/Ep--58-Travel-Router-Unboxing-Dont-Get-Hacked-on-Vacation-e36dgrf

    #WiFiPineapple #Hak5 #CyberSecurity #PenetrationTesting #Unboxing #InfoSec #EthicalHacking #SecurityCocktailHour

    続きを読む 一部表示
    11 分
  • Ep. 58: Travel Router Unboxing: Don't Get Hacked on Vacation!
    2025/08/04

    Back in Episode 54 we talked about vacation cybersecurity, including the dangers of hotel WiFi and public networks. Today we're unboxing the travel router that could save your digital life while traveling (or at least save you a lot of grief).

    🚨 Why You NEED This:

    Hotel WiFi is a hacker's playground. From man-in-the-middle attacks to data theft, public networks are incredibly dangerous. This tiny device creates your own secure network bubble wherever you go!

    🏨 Real Vacation Scenarios:

    Hotel room internet security

    Airport lounge protection

    Coffee shop safety

    Airbnb and rental property networks

    International travel considerations

    続きを読む 一部表示
    14 分
  • Ep 57: Dr. Nikki Robinson: Why Security Teams Fail at Human Factors
    2025/07/03

    It takes an advanced degree to understand the psychology behind why users hate security controls, so we got someone with two: Dr. Nikki Robinson, DSc Cybersecurity, PhD Human Factors. Nikki joins us to break down the real reasons security implementations fail—and how to fix them.

    What You'll Learn:

    🔹Why vulnerability scoring goes wrong (hint: it's not the tech)

    🔹How to get 99% patching rates through automation

    🔹The psychology behind user resistance to security controls

    🔹Why developers say "I can't implement secure code" (and what to do about it)

    🔹Human factors engineering for cybersecurity practitioners

    Real-World Insights:

    ♦️From 60% to 99% vulnerability remediation in 6 months

    ♦️Why 600-page security policies guarantee failure

    ♦️The empathy approach to security policy enforcement

    ♦️API sprawl and agentic AI risks keeping security pros awake

    Dr. Robinson combines IT operations experience with advanced degrees in cybersecurity and human factors psychology. Her research reveals why traditional security approaches create resistance—and practical frameworks that actually work.

    She also schools us in how to make a tequila sunrise (technique matters!)

    続きを読む 一部表示
    53 分
  • Ep. 56: From Zero-Day Hunter to Cyber Defender: Cody Pierce's Journey
    2025/06/20

    Why would a hacker at the top of his game who found dozens of zero-days switch to defense? The answer is a lot more complicated than you think. In this fascinating episode, we sit down with Cody Pierce, co-founder and CEO of Neon Cyber and former Zero Day Initiative researcher. Cody gives us an insider view into the exploit marketplace, and tells us why he went from offense to defense.

    🎯 WHAT YOU'LL DISCOVER:

    ✅ The REAL difference between vulnerabilities and exploits (most people get this wrong)

    ✅ Why attackers "bank" zero-days instead of using them immediately

    ✅ The shocking economics behind exploit marketplaces ($50K to nearly worthless in seconds)

    ✅ How nation-state attacks actually work (it's not what you think)

    ✅ What happened with Cody's own USB hacking tool

    ✅ What motivated Cody to change his approach to ecruity

    Perfect for: Cybersecurity professionals, ethical hackers, IT managers, security researchers, students, and anyone curious about the real world of cyber warfare

    #Cybersecurity #Podcast #ZeroDay #EthicalHacking #InfoSec #InformationSecurity #CyberWarfare #SecurityResearch #Vulnerabilities #Exploits #CyberDefense #ZeroDayInitiative #CyberEthics

    続きを読む 一部表示
    1 時間 4 分
  • Ep. 55: Firmware, Fire and the Future of Cybersecurity | Smoked Manhattans with Paul Asadoorian
    2025/05/27

    Join us for a special episode of the Security Cocktail Hour as co-hosts Joe Patti and Adam Roth sit down with cybersecurity legend Paul Asadoorian—founder of Security Weekly and Principal Security Evangelist at Eclypsium. With more than two decades of experience, Paul brings his unique mix of deep technical knowledge and podcasting charisma to discuss firmware vulnerabilities, supply chain risks, and the overlooked attack surfaces hiding in your hardware. And he literally--and we do mean literally--brings fire to the show.

    🎙️ In This Episode:

    • Paul’s journey to becoming a leading voice in cybersecurity—and how he found a career he truly loves

    • Why firmware and supply chain security are the hidden battlegrounds of modern cyber defense

    • This might finally be the Year of the Linux Desktop.

    Paul's podcasts:

    Paul's Security Weekly: https://www.scworld.com/podcast-show/pauls-security-weekly

    Below the Surface Podcast: https://eclypsium.com/podcasts/


    続きを読む 一部表示
    1 時間 9 分
  • Ep. 54: Don’t Get Hacked on Vacation | Travel Cybersecurity Tips
    2025/05/12

    Got big travel plans this summer? Remember to pack some protection against cyber threats. In this episode of the Security Cocktail Hour podcast, hosts Joe Patti and Adam Roth break down the real cybersecurity threats you face when using hotel Wi-Fi, airport chargers, and public networks—and what you can do to stay safe.

    Learn about:

    • Why public Wi-Fi is more dangerous than you think

    • The truth about VPNs—and what they don’t protect

    • USB “condoms,” OMG cables, and travel routers

    Whether you’re a casual traveler or a frequent flyer, join us to learn how to keep your long-awaited vacation free from cyber headaches.

    💬 Comment and follow us for the latest on cybersecurity from industry experts.

    📌 Got a question or topic idea? Drop it in the comments—we just might feature it in an upcoming episode.

    #Podcast #Cybersecurity #InformationSecurity #Infosec #TravelTips #VPN #WiFiSecurity #USBCondom #DigitalSafety #PublicWiFi


    続きを読む 一部表示
    29 分