Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
| Episode | Date |
|---|---|
|
Agents of Chaos: The Race for Autonomous AI Control
|
Apr 25, 2026 |
|
Anthropic and the Governance of Frontier AI Wealth and Safety
|
Apr 14, 2026 |
|
OAuth Abuse: The Rise of Device Code Phishing Campaigns
|
Mar 29, 2026 |
|
Codex Security: An Agentic Approach to Vulnerability Remediation
|
Mar 10, 2026 |
|
AI Red Teaming and LLM Security Fundamentals Handbook
|
Feb 23, 2026 |
|
The Rise of Agentic Misalignment and AI Code Gatekeeping
|
Feb 15, 2026 |
|
Authentication Downgrade Attacks: Deep Dive into MFA Bypass
|
Feb 07, 2026 |
|
FS-ISAC Strategic Framework for Financial AI Risk Management
|
Jan 29, 2026 |
|
Cybersecurity Weekly Briefing: Emerging Threats and Defensive Innovation
|
Jan 26, 2026 |
|
Under Armour Data Breach and MIGP Security Analysis
|
Jan 23, 2026 |
|
Zero Trust Segmentation: Halting Lateral Movement and Legacy Risk
|
Jan 20, 2026 |
|
Operation MoneyMount-ISO: Phantom Stealer Deployment via ISO
|
Dec 16, 2025 |
|
Browser Zero Trust: Hardening Security Controls
|
Dec 08, 2025 |
|
Weaponizing Language: Red Teaming the Claude Code Agent
|
Nov 26, 2025 |
|
SABSA: Business-Driven Enterprise Security Architecture and Risk Management
|
Nov 14, 2025 |
|
TOGAF ADM and Enterprise Architecture Concepts
|
Nov 14, 2025 |
|
Digital Trust and Risk Management: The Invisible Armor
|
Nov 11, 2025 |
|
Technology and Enterprise Risk Governance
|
Oct 21, 2025 |
|
Garrett Gee's Hacker Mindset and Travel Empire
|
Oct 16, 2025 |
|
AI Transforms SOC: Reactive to Proactive Defense
|
Oct 08, 2025 |
|
Zero-Click Spyware: Pegasus, WhatsApp, and iOS Attacks
|
Oct 07, 2025 |
|
Security Architecture Episode 7: Final - Review
|
Oct 03, 2025 |
|
Security Architecture Episode 2: Core Security Architecture: IAM, Applications, Cloud
|
Oct 02, 2025 |
|
Security Architecture Episode 3: Advanced Security Architecture: Design and Resilience
|
Oct 02, 2025 |
|
Security Architecture Episode 4: Cybersecurity Security Operations: MDRR and Essential Tools
|
Oct 02, 2025 |
|
Security Architecture Episode 5: Cybersecurity Incident Response: The PICERL Framework
|
Oct 02, 2025 |
|
Security Architecture Episode 6: Security Monitoring and Continuous Cybersecurity Improvement
|
Oct 02, 2025 |
|
Security Architecture Episode 1: Foundations of Security Architecture Principles and Frameworks
|
Oct 01, 2025 |
|
Microsoft Entra ID Global Admin Hijacking Flaw
|
Sep 23, 2025 |
|
AI, Social Engineering, and CAPTCHA Security
|
Sep 22, 2025 |
|
Chrome's Seventeen-Year Journey: Speed, Security, Stability, and Simplicity
|
Sep 12, 2025 |
|
September 2025 Windows Security Update Overview
|
Sep 10, 2025 |
|
The GhostAction Supply Chain Attack
|
Sep 09, 2025 |
|
Information Security: Attacks, Strategies, Tools
|
Aug 21, 2025 |
|
Noodlophile Stealer Evolves: Targeted Copyright Phishing Hits Enterprises
|
Aug 20, 2025 |
|
AI Ticking Time Bomb From Chatbot Hacks to Climate Policys
|
Aug 15, 2025 |
|
FortiSIEM: Unauthenticated Command Injection Vulnerabilities
|
Aug 15, 2025 |
|
Model Context Protocol: Security Risks and Best Practices
|
Aug 12, 2025 |
|
GPT-5 AMA: User Feedback and Legacy Model Demands
|
Aug 11, 2025 |
|
Microsoft 365 Credential Phishing via Link Wrapping Abuse
|
Aug 05, 2025 |
|
Executable Secrets: How DreamWalker Builds Trustworthy Call Stacks
|
Jul 31, 2025 |
|
Cracking CraxsRat: Malware Analysis and Protection
|
Jul 24, 2025 |
|
The Practitioner's Guide to AI Risk Assessment
|
Jul 22, 2025 |
|
ChatGPT Agent: Autonomous AI Takes the Reins
|
Jul 19, 2025 |
|
The Warmwind AI OS Revolution
|
Jul 14, 2025 |
|
Retriever AI: The Hyper-Efficient Web Automation Agent
|
Jul 10, 2025 |
|
Microsoft's July 2025 Patch Tuesday: Critical Vulnerabilities Addressed
|
Jul 09, 2025 |
|
AI Revolution: Models, Agents, and Robotics Unleashed
|
Jul 02, 2025 |
|
Special Episode : Trump's Big, Beautiful Bill: Impact on America
|
Jul 01, 2025 |
|
ZPhisher Phishing Tools and Incident Response
|
Jun 30, 2025 |
|
TheFatRat: Exploitation and Evasion Tool
|
Jun 30, 2025 |
|
Gemini CLI: AI Agent for Coding Workflows
|
Jun 26, 2025 |
|
Chromium Browser Screen Spying Techniques
|
Jun 24, 2025 |
|
Bug Bounty Programs and Vulnerability Rewards
|
Jun 24, 2025 |
|
Residential Proxies: Cybercrime's New Enabler
|
Jun 24, 2025 |
|
Remote Access Trojans: History, Dangers, and Defenses
|
Jun 19, 2025 |
|
Cybersecurity: Attacks, Strategies, and Tools
|
Jun 16, 2025 |
|
The Isolated Browser: Web Threat Protection
|
Jun 12, 2025 |
|
The AI Job Seeker Deluge: Risks and Solutions
|
Jun 12, 2025 |
|
AI Advancements: From Robotics to Longevity
|
Jun 06, 2025 |
|
Snowflake Cortex and AI Applications
|
May 27, 2025 |
|
AI and Tech Trends
|
May 27, 2025 |
|
Tech, AI, and Robotics Advancements
|
May 22, 2025 |
|
Microsoft May 2025 Patch Tuesday Update
|
May 13, 2025 |
|
Cyber Threat Intelligence Resources and Trends
|
May 13, 2025 |
|
Cybersecurity Attacks and Tactics
|
May 08, 2025 |
|
LLMs in Cybersecurity
|
May 07, 2025 |
|
InfoSec News and Vulnerability Reports
|
May 06, 2025 |
|
Exploring Enterprise Browser Solutions for Security
|
May 06, 2025 |
|
AWS Workspaces: Security, Best Practices, and Monitoring
|
May 06, 2025 |
|
Building LLM SQL Agents with LangChain
|
May 02, 2025 |
|
Tech and AI News Roundup
|
May 01, 2025 |
|
Urban Laureate: Decoded Culture Drop
|
May 01, 2025 |
|
Tech and AI Developments: Meta, Waymo, Tesla, Intel
|
Apr 30, 2025 |
|
Protecting SNAP Benefits from Skimming Fraud
|
Apr 30, 2025 |
|
Cybersecurity Auditing Guide and Common Findings
|
Apr 30, 2025 |
|
AWS Cloud Security Overview and Certification
|
Apr 29, 2025 |
|
Tech and Science News Update
|
Apr 29, 2025 |
|
InfoSec: Policy Puppetry, Exploits, and AI Security
|
Apr 28, 2025 |
|
SS7 Network Vulnerabilities and Exploits
|
Apr 26, 2025 |
|
Bug Bounty: Finding Flaws and Legal Considerations
|
Apr 24, 2025 |
|
Tech, AI, and Science Highlights (April 24)
|
Apr 24, 2025 |
|
Understanding User and Entity Behavior Analytics (UEBA) by Edward Henriquez
|
Apr 23, 2025 |
|
InfoSec: Security News and Insights
|
Apr 23, 2025 |
|
InfoSec: OpenAI, Browsers, and Future Tech
|
Apr 23, 2025 |
|
AI Models Rapidly Generate Exploit Code by Edward Henriquez
|
Apr 22, 2025 |
|
InfoSec: Security News and Analysis
|
Apr 22, 2025 |
|
Decoded: Data Leak Techniques and Defense by Edward Henriquez
|
Apr 22, 2025 |
|
File Upload Attacks: Techniques, Tools, and Defenses by Edward Henriquez
|
Apr 21, 2025 |
|
Decoding SOC as a Service & SaaS Security by Edward Henriquez
|
Apr 21, 2025 |
|
Tech, Science, and Development Highlights - 2025-04-21
|
Apr 21, 2025 |
|
Cybersecurity AI Bot Army Attacks: The New Frontier by Edward Henriquez
|
Apr 17, 2025 |
|
Agentless Visibility and Control for Network Security by Edward Henriquez
|
Apr 17, 2025 |
|
OpenAI Models, Tech, Science, and AI Business
|
Apr 17, 2025 |
|
InfoSec: 4chan Hack, Data Breaches, and Threat Tactics
|
Apr 16, 2025 |
|
Unmasking Tool Poisoning Attacks: A Cybersecurity by Edward Henriquez
|
Apr 16, 2025 |
|
OpenAI Social Network, Tech Hiring, and More
|
Apr 16, 2025 |
|
AI Escape Attacks: Cybersecurity Implications by Edward Henriquez
|
Apr 15, 2025 |
|
Gridlocked: Cybersecurity Threats in the Power Grid by Edward Henriquez
|
Apr 15, 2025 |
|
Hacking the Telecom Stack: A Cybersecurity Threat Analysis by Edward Henriquez
|
Apr 15, 2025 |
|
Daily Security News Briefing - April 15, 2025
|
Apr 15, 2025 |
|
CISSP Domain 8 Software Security: Practice Questions and Answers by Edward Henriquez
|
Apr 14, 2025 |
|
April 14, 2025 Cyber Threat Landscape Report by Edward Henriquez
|
Apr 14, 2025 |
|
Decoded: QRL Jacking - The Hacker's QR Code Backdoor by Edward Henriquez
|
Apr 14, 2025 |
|
CISSP Domain 7: Security Operations Practice Questions and Answers by Edward Henriquez
|
Apr 13, 2025 |
|
CISSP Domain 6 Security Assessment and Testing Practice Questions and Answers by Edward Henriquez
|
Apr 13, 2025 |
|
CISSP Domain 5: IAM Practice Questions and Answers by Edward Henriquez
|
Apr 13, 2025 |
|
CISSP Domain 4: Network Security Practice Questions and Answers by Edward Henriquez
|
Apr 13, 2025 |
|
API Under Siege by Edward Henriquez
|
Apr 12, 2025 |
|
Decoded: Inside SQL Injection Vulnerabilities and Defenses by Edward Henriquez
|
Apr 12, 2025 |
|
Secrets Sprawl and Automated Identity Attacks by Edward Henriquez
|
Apr 12, 2025 |
|
CISSP Domain 3: Security Architecture and Engineering Practice Questions and Answers by Edward Henriquez
|
Apr 11, 2025 |
|
CISSP Domain 2: Asset Security Practice Questions and Answers by Edward Henriquez
|
Apr 11, 2025 |
|
CISSP Domain 1: Security and Risk Management Practice Questions and Answers by Edward Henriquez
|
Apr 11, 2025 |
|
Cybersecurity Advisory and Vulnerability News: April 10, 2025 by Edward Henriquez
|
Apr 10, 2025 |
|
Lateral Movement: Techniques, Detection, and Prevention Strategies by Edward Henriquez
|
Apr 10, 2025 |
|
Smart Car Cybersecurity: The Hackable Highway by Edward Henriquez
|
Apr 10, 2025 |
|
Decoded: Path Traversal - A Hacker's Perspective by Edward Henriquez
|
Apr 10, 2025 |
|
Cybersecurity News and Trends: April 9, 2025 by Edward Henriquez
|
Apr 10, 2025 |
|
Podcast Listener Engagement: Reviews, Comments, and Support - Thank You
|
Apr 09, 2025 |
|
Cybersecurity Insights and Threat Analysis: April 8, 2025 by Edward Henriquez
|
Apr 09, 2025 |
|
Decoding Non-Human Digital Identities: A Hacker's Deep Dive
|
Apr 08, 2025 |
|
CISSP Study Guide Overview by Edward Henriquez
|
Apr 08, 2025 |
|
Patch Tuesday Overview - April 8, 2025 by Edward Henriquez
|
Apr 08, 2025 |
|
Decoded: Cipher's GIAC Security Essentials by Edward Henriquez
|
Apr 08, 2025 |
|
GSEC Certification: 25 Essential Cybersecurity Questions by Edward Henriquez
|
Apr 08, 2025 |
|
NIST & GIAC: Information Security and Certification Overview by Edward Henriquez
|
Apr 08, 2025 |
|
Fast Flux Networks: Evasion Techniques and Detection by Edward Henriquez
|
Apr 07, 2025 |
|
Decoding Cloud Security Posture Management (CSPM) by Edward Henriquez
|
Apr 07, 2025 |
|
Understanding SASE: Security and Network Evolution by Edward Henriquez
|
Apr 07, 2025 |
|
Decoded: Data Loss Prevention (DLP) Explained by Edward Henriquez
|
Apr 07, 2025 |
|
Decoded: Daily Cybersecurity Insights and Threat Analysis: April 7, 2025 by Edward Henriquez
|
Apr 07, 2025 |
|
Credential Stuffing: The Silent Cybersecurity Threat by Edward Henriquez
|
Apr 06, 2025 |
|
Crypto Hijacking: Detection and Prevention by Edward Henriquez
|
Apr 06, 2025 |
|
Decoded: The Cybersecurity Podcast - Shadow IT by Edward Henriquez
|
Apr 05, 2025 |
|
Stack Spoofing: Evasion and Exploitation Techniques by Edward Henriquez
|
Apr 05, 2025 |
|
Daily Cybersecurity News and Insights - April 05, 2025 by Edward Henriquez
|
Apr 04, 2025 |
|
AI Agents in Cybersecurity: Capabilities and Implications by Edward Henriquez
|
Apr 04, 2025 |
|
Command and Control Servers: Cyber Attack Remote Access by Edward Henriquez
|
Apr 04, 2025 |
|
Reverse Shells: Anatomy, Execution, Detection, and Defense by Edward Henriquez
|
Apr 04, 2025 |
|
Network Ghost: IP and MAC Address Spoofing by Edward Henriquez
|
Apr 04, 2025 |
|
DLL Hijacking: Windows Dynamic Link Library Exploits by Edward Henriquez
|
Apr 04, 2025 |
|
Cybersecurity Pro's Essential Unix Commands by Edward Henriquez
|
Apr 03, 2025 |
|
Kerberos and Active Directory Authentication Explained by Edward Henriquez
|
Apr 03, 2025 |
|
Cybersecurity Threats and Vulnerabilities: April 2025 Insights by Edward Henriquez
|
Apr 03, 2025 |
|
AI and Machine Learning in Cybersecurity by Edward Henriquez
|
Apr 03, 2025 |
|
Dark Web & Cybercrime Economy: The Digital Underworld by Edward Henriquez
|
Apr 03, 2025 |
|
PCAP Analysis for Cybersecurity: Setup and Interpretation by Edward Henriquez
|
Apr 02, 2025 |
|
Network Exfiltration: Tactics and Prevention by Edward Henriquez
|
Apr 02, 2025 |
|
Exploit Kits: Automated Cybercrime Weapons and Defenses by Edward Henriquez
|
Apr 01, 2025 |
|
The Matrix: A Cybersecurity Allegory by Edward Henriquez
|
Apr 01, 2025 |
|
Red Team vs. Blue Team: Offensive and Defensive Cybersecurity by Edward Henriquez
|
Apr 01, 2025 |
|
Malware Payload Extraction: Methods and Analysis by Edward Henriquez
|
Mar 31, 2025 |
|
Trojans: Decoding the Hidden Cyber Threat by Edward Henriquez and
|
Mar 30, 2025 |
|
Spyware: The Silent Cyber Threat by Edward Henriquez
|
Mar 30, 2025 |
|
Ransomware: The Digital Extortion Epidemic by Edward Henriquez
|
Mar 30, 2025 |
|
Inside Malware: Coding, Function, and Defense by Edward Henriquez
|
Mar 29, 2025 |
|
Decoded: Anatomy of a Rootkit by Edward Henriquez
|
Mar 29, 2025 |
|
Inside the Mind of a World-Class Hacker by Edward Henriquez
|
Mar 29, 2025 |
|
Network Security Audit Checklist by Edward Henriquez
|
Mar 28, 2025 |
|
Securing Router Protocols: A Cybersecurity Deep Dive by Edward Henriquez
|
Mar 27, 2025 |
|
OSI Model: A Cybersecurity Perspective by Edward Henriquez
|
Mar 26, 2025 |
|
US Data Breaches: Attacks, Methods, and Prevention by Edward Henriquez
|
Mar 25, 2025 |
|
Decoding Cyber Attacks: The MITRE ATT&CK Framework by Edward Henriquez
|
Mar 25, 2025 |
|
The Pyramid of Pain: Disrupting Cyber Adversaries Strategically by Edward Henriquez
|
Mar 24, 2025 |
|
NIST Incident Response Lifecycle: Preparation to Post-Incident by Edward Henriquez
|
Mar 24, 2025 |
|
Incident Response and Lockheed Martin's Cyber Kill Chain by Edward Henriquez
|
Mar 24, 2025 |
|
Decoded: Episode 2 - Splunk Security Monitoring: Setup and Interface by Edward Henriquez
|
Mar 23, 2025 |
|
Decoded: Episode 1 - Introduction to Splunk by Edward Henriquez
|
Mar 23, 2025 |
|
Breaking into Cybersecurity: Skills and Responsibilities by Edward Henriquez
|
Mar 23, 2025 |
|
Part 13 - CEH v12 Practice Questions: IoT and OT Security: 15 Questions
|
Mar 22, 2025 |
|
Part 12 - CEH v12 Practice Questions: Incident Response and Digital Forensics: Core Concepts
|
Mar 22, 2025 |
|
Part 11 - CEH v12 Practice Questions: Cloud Security and Virtualization Essentials
|
Mar 21, 2025 |
|
Part 10 - CEH v12 Practice Questions: Cryptography and PKI Security Essentials
|
Mar 21, 2025 |
|
Part 9 - CEH v12 Practice Questions: Malware Threats and Analysis: 15 Questions
|
Mar 18, 2025 |
|
Part 8 - CEH v12 Practice Questions: Web Application Attack Fundamentals: 15 Questions
|
Mar 18, 2025 |
|
Part 7 - CEH v12 Practice Questions: Wireless Attack Methods and Security Protocols
|
Mar 16, 2025 |
|
Part 6 - CEH v12 Practice Questions: Web Attack Vulnerabilities and Exploits
|
Mar 16, 2025 |
|
Part 5 - CEH v12 Practice Questions: Social Engineering Techniques and Tactics
|
Mar 15, 2025 |
|
Part 4 - CEH v12 Practice Questions: Windows System Hacking Techniques and Tools
|
Mar 15, 2025 |
|
Part 3 - CEH v12 Practice Questions: Network Scanning and Enumeration Techniques
|
Mar 15, 2025 |
|
Part 2 - CEH v12 Practice Questions: Reconnaissance & Footprinting Fundamentals
|
Mar 14, 2025 |
|
Part 1 - CEH Exam v12 Practice Questions: Ethical Hacking Fundamentals
|
Mar 13, 2025 |
|
Web Application Hacking: Understanding Common Attacks by Edward Henriquez
|
Mar 13, 2025 |
|
Decoded: Hacker's Playbook - Real-World Tactics by Edward Henriquez
|
Mar 12, 2025 |
|
Certified Ethical Hacker (CEH) by Edward Henriquez
|
Mar 07, 2025 |
|
Open-Source DFIR Tools Deep Dive by Edward Henriquez
|
Mar 07, 2025 |
|
Unix & Cybersecurity: Mastering the Command Line for Security by Edward Henriquez
|
Mar 03, 2025 |
|
Cybersecurity Career: A 6-Month Plan for Job Seekers by Edward Henriquez
|
Mar 03, 2025 |
|
PurpleLab: Cybersecurity Lab for Threat Detection, Analysis, and Simulation by Edward Henriquez
|
Feb 27, 2025 |
|
Cracking Passwords: Techniques and Defenses by Edward Henriquez
|
Feb 27, 2025 |
|
Top OSINT Books: Mastering Open Source Intelligence by Edward Henriquez
|
Feb 18, 2025 |
|
CrowdStrike 2024 Threat Hunting Report: Interactive Intrusion Trends
|
Feb 14, 2025 |
|
AI-Powered Cybersecurity Automation by Edward Henriquez
|
Feb 02, 2025 |
|
Hacking and Cybersecurity: Protecting Yourself in the Digital Age
|
Feb 02, 2025 |
|
Deepfakes & AI-Powered Social Engineering by Edward Henriquez
|
Feb 01, 2025 |
|
Patch or Perish: Maximizing ROI with Intune & Automox by Edward Henriquez
|
Feb 01, 2025 |
|
Ghost GPT: Unveiling an AI Cybersecurity Revolution by Edward Henriquez
|
Jan 27, 2025 |
|
Open Source Intelligence (OSINT): Tools and Techniques by Edward Henriquez
|
Jan 23, 2025 |
|
Cyber Threat Intelligence: A Comprehensive Guide by Edward Henriquez
|
Jan 22, 2025 |
|
ISC2 CC Domain 5: Security Operations Exam Study Questions by Edward Henriquez
|
Jan 22, 2025 |
|
ISC2 CC Domain 4: Network Security Exam Study by Edward Henriquez
|
Jan 21, 2025 |
|
ISC2 CC Domain 3: Access Control Study Exam Questions by Edward Henriquez
|
Jan 21, 2025 |
|
ISC2 CC Domain 2: Business Continuity Study Exam Questions by Edward Henriquez
|
Jan 21, 2025 |
|
ISC2 CC Domain 1: Security Principles Study Exam Questions by Edward Henriquez
|
Jan 21, 2025 |
|
Cybersecurity Risk Management by Edward Henriquez
|
Jan 18, 2025 |
|
Penetration Testing and Ethical Hacking by Edward Henriquez
|
Jan 18, 2025 |
|
Incident Response Planning and Technologies by Edward Henriquez
|
Jan 17, 2025 |
|
Zero Trust Security Explained by Edward Henriquez
|
Jan 16, 2025 |
|
OWASP Application Threat Modeling by Edward Henriquez
|
Jan 16, 2025 |
|
Cloud Security Study by Edward Henriquez
|
Jan 16, 2025 |
|
A Day in the Life of a Cybersecurity Analyst by Edward Henriquez
|
Jan 14, 2025 |
|
Common Cyber Attacks: Reducing the Impact by Edward Henriquez
|
Jan 14, 2025 |
|
Essential Cybersecurity Tools by Edward Henriquez
|
Jan 13, 2025 |
|
Enterprise SIEM Solutions by Edward Henriquez
|
Jan 13, 2025 |
|
Enterprise Vulnerability Management by Edward Henriquez
|
Jan 12, 2025 |
|
ISC2 CC Exam Preparation by Edward Henriquez
|
Jan 12, 2025 |