Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
Jens Hyllegaard
Jul 16, 2019
Great podcast on computer security.
Episode | Date |
---|---|
Signal and TeleMessage
|
May 26, 2025 |
2025 Ransomware Update with Ryan Estes
|
May 19, 2025 |
AI and Compliance with Adam Winston
|
Apr 29, 2025 |
The CVE Near-Death Experience
|
Apr 21, 2025 |
Revoking Security Clearances as Punishment
|
Apr 15, 2025 |
Lucid, the Phishing-as-a-Service Platform
|
Apr 07, 2025 |
Github Actions Supply Chain Attacks
|
Mar 31, 2025 |
Polymorphic Extensions
|
Mar 24, 2025 |
Silk Typhoon is Targeting MSPs
|
Mar 17, 2025 |
ByBit Says Bye to $1.4 billion
|
Mar 03, 2025 |
The Elonephant in the Room
|
Feb 18, 2025 |
A Drop in Ransomware Payments
|
Feb 10, 2025 |
Is CVSS Irreparably Flawed?
|
Feb 03, 2025 |
McHacking
|
Jan 13, 2025 |
Our 2025 Security Predictions
|
Dec 16, 2024 |
BootKitty Bootkit
|
Dec 04, 2024 |
Grading our 2024 Security Predictions
|
Nov 25, 2024 |
The Top Exploited Vulnerabilities of 2023
|
Nov 19, 2024 |
The Age of AI-Powered Scams
|
Nov 05, 2024 |
The FortiManager RCE Vulnerability
|
Oct 29, 2024 |
Taking Down The Whole Internet (Archive)
|
Oct 15, 2024 |
LLMHijacking
|
Oct 08, 2024 |
The CUPS Vulnerability
|
Sep 27, 2024 |
How To Deanonymize the TOR Network
|
Sep 24, 2024 |
Kicking EDR Out of the Kernel
|
Sep 16, 2024 |
The White House Tackles BGP Security
|
Sep 09, 2024 |
Are TP-Link's Days Numbered?
|
Aug 26, 2024 |
Leaking Every American's SSN
|
Aug 19, 2024 |
Hacker Summer Camp 2024 Recap
|
Aug 12, 2024 |
BlackHat 2024 Day 2 Recap
|
Aug 10, 2024 |
BlackHat 2024 Day 1 Recap
|
Aug 08, 2024 |
Stay Tuned for Hacker Summer Camp Recaps
|
Aug 06, 2024 |
CrowdStrike's Incident Report
|
Jul 26, 2024 |
Global Security Outage
|
Jul 20, 2024 |
Blast RADIUS
|
Jul 15, 2024 |
OpenSSH regreSSHion Vulnerability
|
Jul 02, 2024 |
Snowflake Breach Campaign
|
Jun 21, 2024 |
Q1 2024 Internet Security Report
|
Jun 17, 2024 |
Recall Windows Recall
|
Jun 04, 2024 |
SSID Confusion Attacks
|
May 20, 2024 |
The 443 Podcast - Episode 291 - Picking Secure Technologies
|
May 15, 2024 |
The 443 - Kraken Edition
|
May 08, 2024 |
The 2024 Verizon DBIR
|
May 06, 2024 |
The 443 Podcast - Episode 288 - Cisco ArcaneDoor Attack
|
May 03, 2024 |
The 443 Podcast - Episode 287 - Ending Session Hijacking
|
May 03, 2024 |
The 443 Podcast - Episode 286 - BatBadBut What?
|
May 03, 2024 |
The 443 Podcast - Episode 285 - A Postmortem of Microsoft's Security Incident
|
May 03, 2024 |
The 443 Podcast - Episode 284 - A Bad Month for Software Supply Chains
|
May 03, 2024 |
The 443 Podcast - Episode 283 - Trucking Worms
|
May 03, 2024 |
Cisco ArcaneDoor Attack
|
Apr 29, 2024 |
BatBadBut What?
|
Apr 15, 2024 |
Bad Month for Software Supply Chains
|
Apr 01, 2024 |
Trucking Worms
|
Mar 26, 2024 |
The 443 Podcast - Episode 279 - Could a Toothbrush Botnet Happen?
|
Mar 20, 2024 |
The 443 Podcast - Episode 280 - Flipping Out Over Flipper Zero
|
Mar 20, 2024 |
The 443 Podcast - Episode 281 - Locking Up LockBit
|
Mar 20, 2024 |
The 443 Podcast - Episode 282 - A Wild Month in Ransomware
|
Mar 19, 2024 |
A Wild Month in Ransomware
|
Mar 11, 2024 |
Locking Up LockBit
|
Feb 26, 2024 |
Flipping Out Over Flipper Zero
|
Feb 20, 2024 |
Could a Toothbrush Botnet Happen?
|
Feb 12, 2024 |
A Door in Apple’s Walled Garden
|
Feb 05, 2024 |
A Blizzard of Threats
|
Jan 29, 2024 |
Androxgh0st Analysis
|
Jan 22, 2024 |
NIST Tackles Adversarial AI
|
Jan 16, 2024 |
RIPE for the Taking
|
Jan 08, 2024 |
Hacking the Crypto Supply Chain
|
Dec 19, 2023 |
Bluetooth Busted
|
Dec 13, 2023 |
Our 2024 Security Predictions
|
Dec 04, 2023 |
Grading our 2023 Security Predictions
|
Nov 27, 2023 |
What to Expect from NIS2
|
Nov 20, 2023 |
Combined Cyber and Kinetic Warfare
|
Nov 13, 2023 |
The White House Tackles AI
|
Nov 06, 2023 |
The Threat Actor That Hacked MGM
|
Oct 30, 2023 |
CISA’s Secure by Design Whitepaper
|
Oct 23, 2023 |
Microsoft is Killing NTLM
|
Oct 16, 2023 |
Q2 2023 Internet Security Report
|
Oct 09, 2023 |
Bing Chat Malvertising
|
Oct 03, 2023 |
Meta’ One Good Deed
|
Sep 18, 2023 |
iPhone’s Latest 0-Day
|
Sep 11, 2023 |
The Qakbot Takedown
|
Sep 05, 2023 |
Weaponizing WinRAR
|
Aug 28, 2023 |
U.S. Cyber Trust Mark
|
Aug 21, 2023 |
Def Con 2023 Recap
|
Aug 14, 2023 |
BlackHat 2023 Recap
|
Aug 11, 2023 |
What Is Same-Origin Policy? Replay
|
Aug 07, 2023 |
Qakbot Qacktivity
|
Jul 31, 2023 |
Red Teaming AI Systems
|
Jul 24, 2023 |
New Microsoft Office 0-Day
|
Jul 17, 2023 |
Q1 2023 Internet Security Report
|
Jul 03, 2023 |
RepoJacking
|
Jun 27, 2023 |
Minecraft Mod Malware
|
Jun 12, 2023 |
How Not to Update Software
|
Jun 05, 2023 |
Naming APTs
|
May 29, 2023 |
TikTok is Banned, Kind Of
|
May 23, 2023 |
An Interview with ChatGPT
|
May 15, 2023 |
Securing Healthcare Tech
|
May 08, 2023 |
Rustbuckets and Papercuts
|
May 01, 2023 |
MSPs Around the World – Americas
|
Apr 24, 2023 |
Zero Trust Maturity Model 2.0
|
Apr 17, 2023 |
Operation Cookie Monster
|
Apr 10, 2023 |
Another Software Supply Chain Attack
|
Apr 04, 2023 |
The NSA’s Guidance on Securing Authentication
|
Mar 27, 2023 |
An Update on Section 230
|
Mar 20, 2023 |
Here Come The Regulations
|
Mar 13, 2023 |
US National Cybersecurity Strategy
|
Mar 07, 2023 |
Cybersecurity’s Toll on Mental Health
|
Feb 27, 2023 |
Successfully Prosecuting a Russian Hacker
|
Feb 21, 2023 |
Live Audience MSP Q&A Panel
|
Feb 13, 2023 |
What is CVSS?
|
Feb 07, 2023 |
CISA Warns of Weaponized RMM Software
|
Jan 31, 2023 |
Report Roundup
|
Jan 23, 2023 |
The RCE Vulnerability That Wasn’t
|
Jan 17, 2023 |
Reviving a Dead Botnet
|
Jan 10, 2023 |
Q3 2022 Internet Security Report
|
Jan 03, 2023 |
2023 Security Predictions
|
Dec 20, 2022 |
Apple’s New Privacy Expansion
|
Dec 13, 2022 |
Hacking Hyundai
|
Dec 06, 2022 |
CISA Incident Response Learnings
|
Nov 29, 2022 |
Attack Surface Management
|
Nov 21, 2022 |
2022 Cybersecurity Predictions Recap
|
Nov 14, 2022 |
Why OpenSSL Downgraded Their Vulnerability
|
Nov 07, 2022 |
CISA’s Cybersecurity Performance Goals
|
Oct 31, 2022 |
Ransomware TTPs Deep Dive
|
Oct 26, 2022 |
Cyber Energy Star
|
Oct 17, 2022 |
Q2 Threats and Guilty CSOs
|
Oct 12, 2022 |
Optus Opts Out of PII Protection
|
Oct 03, 2022 |
An Uber Hack
|
Sep 27, 2022 |
Are CISOs Legally Accountable for Security?
|
Sep 14, 2022 |
A Day in the Life of a Malware Analyst
|
Sep 06, 2022 |
The Twitter Thing
|
Aug 29, 2022 |
2022 Black Hat and Def Con Recap
|
Aug 22, 2022 |
Hacker Summer Camp 2022
|
Aug 09, 2022 |
Private Sector Offensive Actors
|
Aug 02, 2022 |
USA’s Answer to GDPR
|
Jul 25, 2022 |
Rolling PWN
|
Jul 21, 2022 |
Grading Gartner’s Guesses
|
Jun 27, 2022 |
200th Episode Extravaganza
|
Jun 21, 2022 |
Robux Ransomware
|
Jun 14, 2022 |
0-Days for Days
|
Jun 09, 2022 |
Package Hijacking
|
May 31, 2022 |
Building Security Strategies with Matt Lee
|
May 23, 2022 |
CISA Guidance for MSPs
|
May 17, 2022 |
The REturn of REvil?
|
May 09, 2022 |
Most Exploited Vulnerabilities of 2021
|
May 02, 2022 |
Psychic Signatures
|
Apr 26, 2022 |
Hidden Hafnium
|
Apr 18, 2022 |
Patch Management Lag
|
Apr 04, 2022 |
The Rise and Fall of Lapsus$
|
Mar 28, 2022 |
SATCOM Security
|
Mar 21, 2022 |
US-Backed Cryptocurrency
|
Mar 14, 2022 |
Conti Leaks
|
Mar 10, 2022 |
Rewind: Can We Trust Facial Recognition
|
Feb 28, 2022 |
BGP-Powered Crypto Theft
|
Feb 22, 2022 |
Russia, Fighters of Cybercrime?
|
Feb 14, 2022 |
Hacking Back at North Korea
|
Feb 07, 2022 |
The Pwnkit Problem
|
Jan 31, 2022 |
Q3 2021 Internet Security Report
|
Jan 26, 2022 |
The Death of the Carding Marketplace
|
Jan 20, 2022 |
Is Cybersecurity Vocational?
|
Jan 11, 2022 |
Log4Shell Deep Dive
|
Dec 20, 2021 |
Our 2022 Security Predictions
|
Dec 15, 2021 |
2021 Security Predictions Grading
|
Nov 23, 2021 |
CISA Alert Tips Off Adversaries
|
Nov 17, 2021 |
Trojan Source
|
Nov 10, 2021 |
Stealing Make-believe Money
|
Nov 01, 2021 |
Schrödinger’s REvil
|
Oct 25, 2021 |
VirusTotal Global Ransomware Report
|
Oct 18, 2021 |
The SMS Breach You Didn’t Hear About
|
Oct 11, 2021 |
Q2 2021 Internet Security Report
|
Oct 05, 2021 |
Kaseya’s Trusted Third Party
|
Sep 27, 2021 |
OMIGOD!
|
Sep 23, 2021 |
OWASP Update
|
Sep 16, 2021 |
ProxyWare
|
Sep 09, 2021 |
Stop Following Me – Rewind
|
Sep 02, 2021 |
PolyNetwork Heist
|
Aug 27, 2021 |
DEF CON 29 Recap
|
Aug 18, 2021 |
Bad BGP
|
Aug 11, 2021 |
What Is Zero-Trust Security?
|
Aug 02, 2021 |
Why So SeriousSAM
|
Jul 26, 2021 |
Section 230 – Rewind
|
Jul 21, 2021 |
Kaseya & PrintNightmare
|
Jul 12, 2021 |
A Market for Lemons?
|
Jul 07, 2021 |
Q1 2021 Internet Security Report
|
Jun 29, 2021 |
Dark Web Bake Sale
|
Jun 21, 2021 |
-Anom-
|
Jun 15, 2021 |
Atomic Flashcards
|
Jun 07, 2021 |
An Epic Battle
|
May 26, 2021 |
Oil for Ransom
|
May 18, 2021 |
21 Nails
|
May 12, 2021 |
What Is Same-Origin Policy?
|
May 03, 2021 |
Cellebrite Good Times
|
Apr 28, 2021 |
On A Tuesday
|
Apr 21, 2021 |
Combating Disinformation with Nina Jankowicz Rewind
|
Apr 14, 2021 |
Q4 2020 Internet Security Report
|
Apr 08, 2021 |
What Is Content Security Policy?
|
Mar 30, 2021 |
Defense Tips from a Pentester
|
Mar 23, 2021 |
Popping Webmail Shells
|
Mar 17, 2021 |
Hacked by Cosmic Rays
|
Mar 09, 2021 |
Microsoft Says “Regulate Us”
|
Mar 03, 2021 |
RIPE for the Taking
|
Feb 24, 2021 |
So Confused
|
Feb 18, 2021 |
CacheFlow
|
Feb 11, 2021 |
It’s Always DNS
|
Jan 26, 2021 |
AppleScryptominers
|
Jan 19, 2021 |
The Hack of the Decade
|
Jan 11, 2021 |
Biohacking with Amal Graafstra Rewind
|
Dec 28, 2020 |
2021 Security Predictions
|
Dec 07, 2020 |
2020 Predictions Recap
|
Nov 30, 2020 |
Securing SMBs with John Grady
|
Nov 23, 2020 |
Getting SASE with John Grady
|
Nov 16, 2020 |
Packaged Attacks
|
Nov 09, 2020 |
Healthcare Hacking
|
Nov 02, 2020 |
Top Election Security Threats
|
Oct 29, 2020 |
Trickbot Takedown
|
Oct 22, 2020 |
Android Ransomware Evolution
|
Oct 12, 2020 |
ZeroLogon
|
Oct 05, 2020 |
Q2 2020 Internet Security Report
|
Sep 28, 2020 |
Combating Disinformation with Nina Jankowicz
|
Sep 21, 2020 |
Election Security Update
|
Sep 14, 2020 |
Snowden Vindication?
|
Sep 10, 2020 |
Uber Cover Up
|
Aug 31, 2020 |
AI Bloggers
|
Aug 24, 2020 |
The Dark Web Rewind
|
Aug 17, 2020 |
BlackHat 2020 Recap
|
Aug 10, 2020 |
BlackHat and DEF CON Online
|
Aug 03, 2020 |
Meowing Databases
|
Jul 27, 2020 |
Twoops
|
Jul 20, 2020 |
Can We Trust Facial Recognition?
|
Jul 13, 2020 |
Don’t Trust the App
|
Jul 06, 2020 |
Q1 2020 Internet Security Report
|
Jun 29, 2020 |
A New DDoS Record
|
Jun 22, 2020 |
Section 230
|
Jun 15, 2020 |
Nuclear Ransomware
|
Jun 11, 2020 |
Sandworm Situation
|
Jun 01, 2020 |
Unemployment Fraud
|
May 26, 2020 |
Centennial
|
May 20, 2020 |
Toasters and Proxies
|
May 11, 2020 |
Random Name Generator
|
May 04, 2020 |
You’ve Got Mail [App Vulns]
|
Apr 27, 2020 |
xHelper xUpdate
|
Apr 20, 2020 |
Talking Remote Working with Cat Murdock
|
Apr 13, 2020 |
Zoom Zoom
|
Apr 06, 2020 |
Q4 2019 Internet Security Report Recap
|
Mar 31, 2020 |
Securing Remote Workers
|
Mar 23, 2020 |
Phishing for Viruses
|
Mar 16, 2020 |
RSA 2020 – Day 3 Recap
|
Feb 28, 2020 |
RSA 2020 – Day 2 Recap
|
Feb 27, 2020 |
RSA 2020 – Day 1 Recap
|
Feb 26, 2020 |
EmoTed
|
Feb 18, 2020 |
Episode Delay
|
Feb 17, 2020 |
A Wagon Full of Phones
|
Feb 10, 2020 |
Breaches of Trust
|
Feb 03, 2020 |
Q3 2019 Internet Security Report Recap
|
Dec 26, 2019 |
2020 Cyber Security Predictions
|
Dec 09, 2019 |
Elderly Ransomware
|
Dec 04, 2019 |
Like Stealing a Capri Sun
|
Nov 26, 2019 |
Mr. Robot Recap
|
Nov 18, 2019 |
Android App Defense Alliance
|
Nov 11, 2019 |
DTrack Damage
|
Nov 04, 2019 |
Cyber Security Awareness Month – Manufacturing and MSPs
|
Oct 28, 2019 |
Cyber Security Awareness Month – Retail and Hospitality
|
Oct 21, 2019 |
Cyber Security Awareness Month – Education
|
Oct 14, 2019 |
Cyber Security Awareness Month – Healthcare
|
Oct 07, 2019 |
The Vulnies
|
Sep 29, 2019 |
Emotet Eternal
|
Sep 23, 2019 |
DNS Security
|
Sep 16, 2019 |
Hacking Android’s Universe
|
Sep 09, 2019 |
Lone Star Ransomware
|
Aug 23, 2019 |
Penetration Testing
|
Aug 19, 2019 |
Def Con 27 Recap – Day 2
|
Aug 14, 2019 |
Def Con 27 Recap – Day 1
|
Aug 13, 2019 |
Black Hat 2019 Recap – Day 2
|
Aug 12, 2019 |
Black Hat 2019 Recap – Day 1
|
Aug 09, 2019 |
What’s In Your Wallet?
|
Aug 05, 2019 |
US Justice and Injustice
|
Jul 29, 2019 |
FaceApp FUD
|
Jul 22, 2019 |
DerpTroll Detention
|
Jul 15, 2019 |
Happy America Day!
|
Jul 08, 2019 |
The Q1 2019 Internet Security Report
|
Jul 01, 2019 |
One Full Trip Around the Sun
|
Jun 24, 2019 |
Biohacking with Amal Graafstra
|
Jun 17, 2019 |
2019 Security Predictions Mid-Year Review
|
Jun 10, 2019 |
Facial Recognition Facts and Fears
|
Jun 03, 2019 |
Another Busy News Day
|
May 20, 2019 |
Big News Roundup
|
May 13, 2019 |
When Hacking and Gaming Collide
|
May 06, 2019 |
Stop Following Me!
|
Apr 29, 2019 |
Hacking VR With UNHcFREG
|
Apr 22, 2019 |
Interviewing a Former Signals Intelligence Professional
|
Apr 15, 2019 |
Greetings From the UK!
|
Apr 08, 2019 |
Biohacking Part 2 – Grinders
|
Apr 01, 2019 |
Internet Security Report Special Edition Q4 2018
|
Mar 25, 2019 |
Biohacking Part 1
|
Mar 18, 2019 |
RSA Conference 2019 – Conversations from Booth Land
|
Mar 11, 2019 |
RSA Conference Preview
|
Mar 04, 2019 |
All Hail Our AI Overlords
|
Feb 25, 2019 |
Roses Are Red, WatchGuard Is Too
|
Feb 18, 2019 |
reCAPTCHA Roundup
|
Feb 11, 2019 |
Our First Live Podcast – Kicking off 2019
|
Feb 04, 2019 |
How to Breach a Company
|
Jan 28, 2019 |
How a Government Shutdown Affects Cybersecurity
|
Jan 21, 2019 |
Hacking for PewDiePie
|
Jan 14, 2019 |
Talking MFA with Roger Grimes
|
Jan 07, 2019 |
Best of 2018 Recap
|
Dec 31, 2018 |
The Q3 2018 Internet Security Report
|
Dec 17, 2018 |
Securing Your Smart Home
|
Dec 10, 2018 |
The 2019 Predictions That Didn’t Make It
|
Dec 04, 2018 |
What We Are Thankful For
|
Nov 26, 2018 |
Black Friday and Cyber Monday Security Tips
|
Nov 19, 2018 |
Special Edition – 2019 Security Predictions
|
Nov 15, 2018 |
Scoring Last Year’s Security Predictions – How’d We Do?
|
Nov 12, 2018 |
Hacking the Mid-Terms
|
Nov 05, 2018 |
Rise of the Bots
|
Oct 29, 2018 |
Web App Security Basics
|
Oct 22, 2018 |
Hacked Hardware and Sad Security
|
Oct 15, 2018 |
Where Do Hackers Come From?
|
Oct 08, 2018 |
What Are Digital Certificates?
|
Oct 01, 2018 |
Weaponized Stuxnet
|
Sep 24, 2018 |
Q2 2018 Internet Security Report
|
Sep 17, 2018 |
What is Deep Inspection?
|
Sep 10, 2018 |
Overlooked IoT
|
Sep 04, 2018 |
Hacking Outside the Box
|
Aug 27, 2018 |
More Wi-Fi Troubles
|
Aug 20, 2018 |
Las Vegas Hacking Conference Week
|
Aug 13, 2018 |
Tales of Black Hats (and DEF CONs) Past
|
Aug 06, 2018 |
Black Hat 2018 and DEF CON 26 Preview
|
Jul 30, 2018 |
Russian Hackers and Wi-Fi Attackers
|
Jul 23, 2018 |
What is the Dark Web?
|
Jul 16, 2018 |
Under the Hood of HTTPS
|
Jul 09, 2018 |
Nation State Attacks
|
Jul 02, 2018 |
Special Edition: New Internet Security Report
|
Jun 28, 2018 |
Host Q&A: The Men Under the White Hats
|
Jun 26, 2018 |
The Insecurity of IoT
|
Jun 26, 2018 |
Breaking Down the Blockchain and Cryptocurrency
|
Jun 26, 2018 |
Introducing “The 443 – Security Simplified” Podcast
|
Jun 17, 2018 |