エピソード

  • Pwnagotchi: The AI Pet That Hunts Your Network Credentials
    2025/06/02

    What happens when you cross a Tamagotchi with a Wi-Fi hacking tool? You get the Pwnagotchi—a pocket-sized device that "feeds" on Wi-Fi handshakes and learns from its environment. In this episode, Jayden Troffler and Cameron Birkland join the crew to demonstrate how this deceptively cute device can passively capture encrypted Wi-Fi credentials from any network in range, autonomously gather handshakes, share intelligence with other Pwnagotchis, and operate completely under the radar from conference floors to airplane cabins in ways that might surprise you.

    • Key Topics Covered:
    • How the Pwnagotchi captures Wi-Fi handshakes through deauthentication attacks
    • • Why WPA3 networks are immune (and why most networks still aren't using it)
    • Building your own Pwnagotchi vs buying a Flipper Zero with Wi-Fi dev board
    • • Real defense strategies beyond "just turn off your Wi-Fi"
    • The legal gray areas of passive Wi-Fi monitoring
    • Conference horror stories and the 600-handshake airplane incident

    Whether you're a security professional looking to understand emerging threats or someone curious about DIY hacking tools, this episode delivers practical insights you can use to protect your networks today. The Pwnagotchi proves that the most dangerous attacks often come in the most innocent packages.

    Don't let your organization become the next victim of passive Wi-Fi attacks. Like, share, and subscribe for more hands-on cybersecurity content that keeps you ahead of emerging threats!

    #Pwnagotchi #cybersecurity #wifihacking #ethicalhacking #infosec #flipper zero

    続きを読む 一部表示
    35 分
  • Pi-hole: The Open Source DNS Firewall Revolutionizing Network Security
    2025/05/12

    Your network is talking behind your back—but Pi-hole is listening. Join The Audit as Pi-hole co-founders Dan Schaefer and Adam Warner reveal how their open-source DNS sinkhole technology has become the secret weapon for over 200,000 privacy-conscious users worldwide.

    In this episode, we discuss:

    • How Pi-hole evolved from a simple ad blocker to a critical network security tool
    • Why DNS-level filtering stops threats before they reach any of your devices
    • The performance benefits that make browsing noticeably faster
    • Setting up Pi-hole on everything from Raspberry Pi to enterprise hardware
    • How the global development team maintains this powerful security shield
    • Protecting vulnerable IoT devices from malicious traffic
    • The future roadmap for Pi-hole and opportunities to contribute

    Don't miss this deep dive into the technology that's reclaiming control of digital footprints one DNS request at a time. Connect with the Pi-hole community at discourse.pi-hole.net and discover why cybersecurity professionals consider this an essential defensive tool.

    Like, share, and subscribe for more cutting-edge cybersecurity insights and expert analysis!

    #pihole #DNSfiltering #networksecurity #adblocking #privacytools #cybersecurity #opensource #infosec

    続きを読む 一部表示
    40 分
  • Cybersecurity News: E-Z Pass Scam, Dead Internet Theory & $16.6B FBI Report
    2025/05/05

    Join The Audit for a news-packed episode as cybersecurity expert Matt Starland recounts a chilling near-miss with an E-Z Pass phishing scam—received just minutes after renting a car in Florida. His close call highlights how scammers exploit timing and context to deceive even seasoned professionals.

    In this episode, we discuss:

    • How a security pro nearly fell for a perfectly timed phishing text
    • The FBI’s 2023 Internet Crime Report and its $16.6B warning
    • Why nearly $5B in losses hit Americans over 60—and why many stay silent
    • The psychological barriers victims face when reporting cybercrime
    • The rise of the “Dead Internet Theory” and AI-generated online content
    • How Meta and others are blurring the line between real and artificial
    • Practical ways to spot AI-generated interactions
    • Why maintaining human connection is key in the age of AI

    Don’t miss this timely conversation packed with real-world insights and strategies to help you stay secure in an increasingly digital (and artificial) world.

    Like, share, and subscribe for more cutting-edge cybersecurity stories and expert analysis.

    #infosec #cybersecurity #E-ZPass #phishing #FBI #deadinternet #meta

    続きを読む 一部表示
    42 分
  • Inside InfraGard: How FBI Partnerships Attack Risks to Critical Infrastructure
    2025/04/21

    Join The Audit as we dive into the high-stakes intersection of critical infrastructure and cybersecurity with Tim Herman, President of InfraGard Minnesota. InfraGard is a unique public-private partnership with the FBI designed to protect the 85% of America's essential systems owned by the private sector. From power grids to transportation, the vulnerabilities are real—and increasingly complex.

    In this episode, we discuss:

    • How joystick-operated tugboats on the Mississippi reveal hidden cyber risks
    • Why tabletop exercises are vital for incident readiness
    • Common mistakes in organizational response plans (and how to fix them)
    • The importance of physical backups and redundant communication systems
    • Actionable steps to bridge the gap between planning and execution

    Cybersecurity isn’t just an IT issue—it’s national security. Don’t miss this compelling conversation on how InfraGard is helping organizations build resilience before the next breach hits.

    Like, share, and subscribe for more expert insights from the frontlines of cybersecurity.

    続きを読む 一部表示
    34 分
  • The Future of Quantum: Majorana Particles, Encryption, AI, and Parallel Universes
    2025/04/07

    Join The Audit as we explore the cutting-edge world of quantum computing with information security architect, Bill Harris. Quantum technology is advancing at breakneck speed, pushing the boundaries of computation, while Quantum Key Distribution (QKD) is making encrypted communications nearly unbreakable.

    As multiple sectors race to integrate quantum and AI, cybersecurity experts are racing to implement quantum-resistant encryption before traditional cryptographic methods become obsolete. Beyond the technical breakthroughs, quantum computing is also raising profound questions about reality itself.

    In this episode, we discuss:

    • The rise of 1,000-qubit machines and persistent error challenges
    • How QKD is reshaping secure communication worldwide
    • Microsoft’s Majorana particle claims—fact or hype?
    • NASA’s mysterious quantum shutdown in February 2024
    • Google’s research into quantum and unexpected findings
    • The cybersecurity arms race to counter quantum decryption

    Quantum computing isn’t just the future—it’s here, and it’s reshaping everything from cybersecurity to our understanding of the universe. Don’t miss this deep dive into the most mind-bending technology of our time!

    Like, share, and subscribe for more in-depth cybersecurity insights.

    #QuantumComputing #Cybersecurity #Encryption #AI #ParallelUniverses

    続きを読む 一部表示
    37 分
  • Eco-Security: The Intersection of Recycling and Technology
    2025/03/24

    What Really Happens to Your Trash? Inside Modern Waste Management

    Is your trash really being recycled, or is it ending up in a landfill? In this episode of The Audit, we sit down with Trista Martinson, Executive Director at Ramsey Washington Recycling & Energy, to uncover the surprising technology and cybersecurity challenges behind modern waste management.

    Trista joins the IT Audit Labs team to reveal how AI, robotics, and environmental science are transforming recycling, while also sharing how The Audit's own Eric Brown helped strengthen her organization’s cybersecurity to protect critical infrastructure.

    In this episode, we discuss:

    • How AI and robotics are revolutionizing waste processing
    • The reality behind China’s global recycling market
    • Why recycling facilities are prime targets for cyberattacks
    • The role of cybersecurity in protecting critical infrastructure
    • How a military mindset influences risk assessment
    • The biggest mistakes people make when disposing of trash

    From optimizing recycling with data to securing waste facilities against ransomware, this episode dives deep into the hidden world of trash, tech, and security.

    🔔 Subscribe for more cybersecurity and technology insights!

    #Cybersecurity #WasteManagement #Recycling #AI #TheAuditPodcast

    続きを読む 一部表示
    23 分
  • SOC Audits Decoded: What Your Business Needs to Know Now!
    2025/03/10

    Are SOC audits just another compliance requirement, or do they provide real security value? In this episode of The Audit, we sit down with Adam Russell from Schellman to debunk common misconceptions about SOC audits and explore why they’re more than just a checkbox exercise—especially for startups.

    Adam joins the IT Audit Labs team for a deep dive into the often-misunderstood world of attestations, sharing expert insights on how organizations can effectively prepare for a SOC audit and determine which security assessments best fit their needs.

    In this episode we discuss:

    - The biggest mistakes startups make with SOC audits

    - Why SOC 2 is more flexible than you might think

    - The myth that big companies are always secure

    - How SOC assessments can strengthen security culture

    - Gamified training & newsletters for better compliance engagement

    - How external auditors can empower internal teams

    Whether you're preparing for your first SOC audit or navigating complex compliance requirements, this episode is packed with actionable insights to help you enhance security and compliance strategies.

    🔔 Subscribe for more cybersecurity insights!

    #Cybersecurity #SOCAudit #Compliance #StartupSecurity #TheAuditPodcast

    続きを読む 一部表示
    36 分
  • Cybersecurity News: Elon's Audits, Finland’s Tabletop Security, & AI Threats
    2025/02/24

    Think audits are just paperwork? Think again. They’re the frontline defense against security gaps, data breaches, and unchecked access.

    In this episode of The Audit, we break down how Elon Musk’s unexpected access to FEMA’s sensitive data underscores the critical role of audits in organizational security. We reveal how regular audits and third-party reviews expose vulnerabilities, enforce accountability, and strengthen cyber defenses before attackers can exploit them.

    Key Topics We Cover:

    • How audits uncover hidden cybersecurity risks

    • Finland’s cutting-edge approach to cyber resilience

    • Why tabletop exercises and real-world drills are game changers

    • A shocking social engineering attack at a library—and what it teaches us

    Cyber threats evolve fast—don’t wait until you’re the next headline. Whether you're a cybersecurity pro or just getting started, this episode is packed with actionable insights you can’t afford to miss.

    Like, share, and subscribe for the latest cybersecurity news and expert analysis!

    #Cybersecurity #Auditing #Infosec #SocialEngineering #SecurityNews

    続きを読む 一部表示
    39 分