Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22
Introduction
00:00 • 3min
The New Hotness: Quantified Risk Assessments
03:01 • 2min
How to Network Like a Pro
04:55 • 2min
Callan's Art of the Week
06:35 • 2min
Chachi PT: The Most Powerful Weapon of Our Time
08:32 • 2min
How to Hack With Prompt Engineering
10:07 • 5min
Sullivan Received a Three-Year Probation
15:35 • 4min
Oakland Attack Targets City in Massachusetts
19:51 • 2min
The Threat of Ransomware in Local Government
21:50 • 4min
Email Alerts for Office 365 Tenants
25:30 • 3min
How to Reduce Risk Effectively With Xm Cyber's 2023 State of Exposure Management Report
28:34 • 6min
Dragon Breath: A Double Dip DLL Side Load Strategy
34:26 • 3min
The Importance of Code Signing for Side Loading
37:10 • 4min
Fortinet Is Warning About an Attack
41:02 • 1min
The Cyber Kill Chain
42:28 • 5min
How to Interface With a Compromised Machine Using a C2 Framework
47:40 • 6min
The Ransomware Story
53:19 • 5min
How to Be a Successful Hacker
58:00 • 4min
The Importance of Investing in Your Mobile Studio
01:01:52 • 4min
Google Cyber Security Certification
01:05:46 • 3min
How to Lead a Practical API Hacking Course
01:08:34 • 4min
How to Get Into Cyber Security
01:12:20 • 5min


