The InfoSec & OSINT Show

Follow The InfoSec & OSINT Show
Share on
Copy link to clipboard

The goal of the podcast is to share practical tips of what works and what doesn't in information security. Essentially we turn our guests' wisdom into practical tips you can use to improve your own skills.

Josh Amishav


    • Nov 11, 2021 LATEST EPISODE
    • infrequent NEW EPISODES
    • 28m AVG DURATION
    • 80 EPISODES


    Search for episodes from The InfoSec & OSINT Show with a specific topic:

    Latest episodes from The InfoSec & OSINT Show

    Episode 80 | Psychology and Ransomware

    Play Episode Listen Later Nov 11, 2021 7:30


    In Episode 80, Josh Amishav talks about the pyschological warfare that is being waged against various ransomware gangs, developments to Darkside, REvil and Blackmatter, Russia's handling of cyber criminals, using stealer log combo lists as part of your OSINT investigations and more.  For more information, including the show notes check out: https://breachsense.io/podcast 

    Episode 79 | Mastering The Science Behind Social Engineering

    Play Episode Listen Later Nov 4, 2021 37:52


    In Episode 79, Josh Amishav chats with Mike Murr about the science behind social engineering, micro-expressions, FACS, which is the Facial Action Coding System, Common mistakes made during SE engagements, manipulation techniques and more.  For more information, including the show notes check out: https://breachsense.io/podcast 

    Episode 78 | The 3 Root Causes of Ransomware

    Play Episode Listen Later Oct 28, 2021 9:05


    In Episode 78, Josh Amishav does a solo adventure to talk about the thought process behind launching the Breachsense Darkweb API. The three main takeaways from the episode are: How ransomware has become a life and death issue What effect shutting down the REvil gang has had The 3 most common initial attack vectors used in ransomware attacks For more information, including the show notes check out: https://breachsense.io/podcast 

    Episode 77 | Collecting Threat Intel For Good

    Play Episode Listen Later Oct 21, 2021 23:03


    In Episode 77, Josh Amishav talks with Nate Warfield about threat intel, CTI League and cloud risk. My three main takeaways from the episode are: How to use tags to easily search Shodan for systems vulnerable to specific CVEs The most common threats the medical sector faces A couple of interesting techniques he uses to collect threat intel For more information, including the show notes check out: https://breachsense.io/podcast 

    Episode 76 | Automating Attack Surface Management

    Play Episode Listen Later Oct 14, 2021 29:14


    In Episode 76, Josh Amishav chats with Chris Dale about several techniques to associate a given asset back to a company. Three takeaways from the episode are: How to generate a custom wordlist for brute forcing your target A bunch of methods to correlate associated company assets via things like the DOM, JARM and TLS How to automate vulnerability discover For more information, including the show notes check out: https://breachsense.io/podcast 

    75 - Jeff Man - From the NSA to PCI

    Play Episode Listen Later Oct 7, 2021 61:51


    In episode 75, Jeff Man joins us to talk about his time in the NSA, PCI, Hak4Kidz and content creation. My 3 main takeaways were 1) What red teaming was like in the 80s 2) Why PCI gets a bad reputation and 3) His tips for giving great conference talks. For more information, including the show notes check out: https://breachsense.io/podcast 

    74 - Brett Johnson & Online Crime

    Play Episode Listen Later Sep 16, 2021 38:21


      In episode 73, Higinio Ochoa joins us for a behind the scenes look at his hacking escapades with Anonymous. The same methodology can be used for bug hunting today. My 3 main takeaways were 1) Building target lists at scale 2) His two OpSec mistakes which led to him getting caught and 3) What his must have hacking tools are now. For more information, including the show notes check out: https://breachsense.io/podcast  In episode 74, Brett Johnson joins us to talk about online crime, social engineering, spear phishing and trust. My 3 main takeaways were 1) How criminals convince us to trust them online 2) Bypassing company policies via social engineering and 3) How to get people to believe fake news and legends over facts For more information, including the show notes check out: https://breachsense.io/podcast 

    73 - Higinio Ochoa & Hacking with Anonymous

    Play Episode Listen Later Sep 9, 2021 34:47


      In episode 73, Higinio Ochoa joins us for a behind the scenes look at his hacking escapades with Anonymous. The same methodology can be used for bug hunting today. My 3 main takeaways were 1) Building target lists at scale 2) His two OpSec mistakes which led to him getting caught and 3) What his must have hacking tools are now. For more information, including the show notes check out: https://breachsense.io/podcast 

    72 - Nathan Sweaney & The Future of Privacy

    Play Episode Listen Later Sep 2, 2021 36:47


      In episode 72, Nathan Sweaney joins us talk about the future of privacy. My 3 main takeaways were 1) Who's collecting our bluetooth and wifi signals 2) How to get your talk accepted to a security con and 3) How he used OSINT to steal (in air quotes) his twitter handle from a Nazi. For more information, including the show notes check out: https://breachsense.io/podcast 

    71 - Peter Taylor & Fraud Detection

    Play Episode Listen Later Aug 26, 2021 29:20


      In episode 71, Peter Taylor "The Fraud Guy" joins us talk about various aspects of fraud. My 3 main takeaways were 1) The common types of fraud he sees in his investigations 2) How Covid has influenced the fraud space and 3) Why aged shell companies and email addresses are so valuable For more information, including the show notes check out: https://breachsense.io/podcast 

    70 - Bob Diachenko & Hunting Open Databases

    Play Episode Listen Later Aug 19, 2021 38:19


        In episode 70, Volodymyr "Bob" Diachenko joins us talk about his research around open databases. My 3 main takeaways were 1) How he finds open databases 2) How he stays on the legal side when verifying his research and 3) Some cyber hygiene tips to prevent allowing unauthorized access to your critical infrastructure  For more information, including the show notes check out: https://breachsense.io/podcast 

    69 - James Linton & The Email Prankster

    Play Episode Listen Later Aug 12, 2021 31:55


      In episode 69, James Linton joins us talk about his email pranking days and Business Email Compromise in general. My 3 main takeaways were 1) some tactical tips on how he gained rapport on the initial contact 2) common risks associated with email related fraud and 3) how to protect yourself against email scams For more information, including the show notes check out: https://breachsense.io/podcast 

    68 - Christian Espinosa & Tactical Communication

    Play Episode Listen Later Aug 5, 2021 29:09


      In episode 68, Christian Espinosa joins us talk about effective communication. My 3 main takeaways were 1) Why we need to stop listening for agreement and instead look for insights 2) how acknowledging yourself plays a critical role in your ability to recognize others achievements and 3) The advantages of mono-tasking vs multi-tasking For more information, including the show notes check out: https://breachsense.io/podcast 

    67 - Evan Francen & Security Fundamentals

    Play Episode Listen Later Jul 29, 2021 28:51


      In episode 67, Evan Francen hangs out to talk about security fundamentals, communicating risk & passwords. My 3 main takeaways were 1) What a CISOs job actually is when you boil it down 2) How to choose a risk methodology that's right for you and 3) Some of the intricacies involved in secure password management For more information, including the show notes check out: https://breachsense.io/podcast 

    66 - Matt Danner & Digital Forensics

    Play Episode Listen Later Jul 22, 2021 35:49


      In episode 66, Matt Danner joins the show to talk about digital forensics. My 3 main takeaways were 1) How to perform a forensics investigation against Google Storage 2) What the limitations of the Google Drive API are and 3) How to approach iOS and Android devices in an investigation. For more information, including the show notes check out: https://breachsense.io/podcast 

    65 - Martina Dove PhD & The Psychology of Scams

    Play Episode Listen Later Jul 15, 2021 34:16


    In episode 65, I talk with Dr. Martina Dove about the psychology behind fraud, persuasion and scam techniques. My 3 main takeaways were 1) What makes some people more susceptible to fraud 2) the techniques scammers use to convince us to take certain actions and 3) What influence factor is the most powerful For more information, including the show notes check out: https://breachsense.io/podcast 

    64 - Daniel Cuthbert & Pen Testing with the ASVS

    Play Episode Listen Later Jul 8, 2021 24:21


    In episode 64, Daniel Cuthbert joins us to talk about the OWASP Application Security Verification Standard. My 3 main takeaways were 1) Why the ASVS will make you a better pen tester and even bounty hunter 2) How to use the ASVS for threat modelling and 3) His tips on getting your talk accepted at a security conference For more information, including the show notes check out: https://breachsense.io/podcast 

    63 - Nico "Dutch_Osintguy" Dekens & Leveraging Telegram in OSINT

    Play Episode Listen Later Jul 1, 2021 30:55


      In episode 63, I talk with Nico Dekens, a.k.a Dutch_Osintguy about the dangers of relying on one search engine, Telegram OpSec, browser extensions & more. My 3 main takeaways were 1) When specific search engines will give you better results than others 2) How Telegram can be a better OSINT source than Tor and 3) Search techniques for finding the right keywords and channels on Telegram For more information, including the show notes check out: https://breachsense.io/podcast 

    62 - Alissa Knight & Hacking Cars

    Play Episode Listen Later Jun 24, 2021 35:32


        In episode 62, Alissa Knight, the author of Hacking Connected Cars, joins us to talk about hacking connected cars, APIs, defense as well as vulnerability management. My 3 main takeaways were 1) Where to even begin with car hacking 2) The challenges car manufacturers have when trying to defend against these attacks and 3) How APIs are shaping the future of hacking For more information, including the show notes check out: https://breachsense.io/podcast 

    61 - Robert Graham & Large Scale Port Scanning w/Masscan

    Play Episode Listen Later Jun 17, 2021 29:27


      In episode 61, Robert Graham, the creator of masscan, joins us to talk about running internet wide port scanning the right way. My 3 main takeaways were 1) How to use the banner function correctly 2) How to figure out the fastest rate you can send packets and 3) The most common mistakes Rob sees when folks run masscan For more information, including the show notes check out: https://breachsense.io/podcast 

    60 - AJ Yawn & Automating AWS Security

    Play Episode Listen Later Jun 10, 2021 37:52


        In episode 60, we chat with AJ Yawn about AWS security, compliance in the cloud, choosing an auditor and more. My 3 main takeaways were 1) How to make compliance not suck 2) How to automate security within an AWS environment and 3) What shared responsibility means when managing cloud infrastructure For more information, including the show notes check out: https://breachsense.io/podcast 

    59 - Tim Adams & DNS Filtering

    Play Episode Listen Later Jun 3, 2021 21:06


        In episode 59, Tim Adams joins us this week to talk DNS security, Zero Trust, TLD filtering and more. My 3 main takeaways were 1) How to integrate DNS Response Policy Zones, or RPZs, to prevent access to known bad domains 2) How aged a domain should be, sort of like wine, before trusting it and 3) DNS Tunneling, how to identify it and stop it For more information, including the show notes check out: https://breachsense.io/podcast 

    58 - Ryan Dewhurst & Securing WordPress

    Play Episode Listen Later May 27, 2021 32:02


    Ben Dowling hangs out this week to talk about IP Geolocation. My 3 main takeaways were 1) how they determine where an IP address is actually located 2) how they deal with massive amounts of crowdsourced geodata 3) how they attribute IP addresses to specific companies For more information, including the show notes check out: https://breachsense.io/podcast  Ryan Dewhurst joins us this week to talk about all things WPScan. My 3 main takeaways were 1) common mistakes he sees when people run wpscan 2) 3 things you can do to stop 90% of WordPress attacks 3) His tips on launching a security tool For more information, including the show notes check out: https://breachsense.io/podcast 

    57 - Ben Dowling & IP Geolocation

    Play Episode Listen Later May 20, 2021 32:40


          In episode 56, Assaf Dahan  joins us to talk about ransomware, monetization techniques, attribution and getting started as a malware researcher. My 3 main takeaways were 1) why the double extortion method is so popular 2) how long it takes to exfiltrate our data 3) the most common initial attack vectors used to infect targets For more information, including the show notes check out https://breachsense.io/podcast       In episode 56, Assaf Dahan  joins us to talk about ransomware, monetization techniques, attribution and getting started as a malware researcher. My 3 main takeaways were 1) why the double extortion method is so popular 2) how long it takes to exfiltrate our data 3) the most common initial attack vectors used to infect targets For more information, including the show notes check out https://breachsense.io/podcast In episode 56, Assaf Dahan  joins us to talk about ransomware, monetization techniques, attribution and getting started as a malware researcher. My 3 main takeaways were 1) why the double extortion method is so popular 2) how long it takes to exfiltrate our data 3) the most common initial attack vectors used to infect targets For more information, including the show notes check out https://breachsense.io/podcast  Ben Dowling hangs out this week to talk about IP Geolocation. My 3 main takeaways were 1) how they determine where an IP address is actually located 2) how they deal with massive amounts of crowdsourced geodata 3) how they attribute IP addresses to specific companies For more information, including the show notes check out: https://breachsense.io/podcast 

    56 - Assaf Dahan & Ransomware Trends

    Play Episode Listen Later May 13, 2021 31:02


        In episode 56, Assaf Dahan  joins us to talk about ransomware, monetization techniques, attribution and getting started as a malware researcher. My 3 main takeaways were 1) why the double extortion method is so popular 2) how long it takes to exfiltrate our data 3) the most common initial attack vectors used to infect targets For more information, including the show notes check out https://breachsense.io/podcast 

    55 - Charlie Belmer & NoSQL Injection

    Play Episode Listen Later May 6, 2021 34:18


    This week Jeff Foley hangs all to talk about asset discovery using amass, recon methodologies,  hashcat style brute forcing vs. wordlists, extending functionality via the embedded Lua engine and more. My 3 main takeaways were 1) how to find assets that don't share a domain name using JARM 2) how they made scanning faster by essentially lowering the DNS brute forcing query rate and 3) what the future has in store for the project For more information, including the show notes check out https://breachsense.io/podcast            This week Jim Manico joins the show to talk about Cross Site Scripting, CSPs, strict dynamic, trusted types, SameSite cookies,  NIST SP 800-63, password shucking and more. My 3 main takeaways were 1) how to do input validation correctly 2) why using nonces in your CSP is safer than creating an allowed list policy and 3) the right way to handle passwords For more information, including the show notes check out https://breachsense.io/podcast This week Jim Manico joins the show to talk about Cross Site Scripting, CSPs, strict dynamic, trusted types, SameSite cookies,  NIST SP 800-63, password shucking and more. My 3 main takeaways were 1) how to do input validation correctly 2) why using nonces in your CSP is safer than creating an allowed list policy and 3) the right way to handle passwords For more information, including the show notes check out https://breachsense.io/podcast This week Jim Manico joins the show to talk about Cross Site Scripting, CSPs, strict dynamic, trusted types, SameSite cookies,  NIST SP 800-63, password shucking and more. My 3 main takeaways were 1) how to do input validation correctly 2) why using nonces in your CSP is safer than creating an allowed list policy and 3) the right way to handle passwords For more information, including the show notes check out https://breachsense.io/podcast This week Jim Manico joins the show to talk about Cross Site Scripting, CSPs, strict dynamic, trusted types, SameSite cookies,  NIST SP 800-63, password shucking and more. My 3 main takeaways were 1) how to do input validation correctly 2) why using nonces in your CSP is safer than creating an allowed list policy and 3) the right way to handle passwords This week Charlie Belmer joins the show to chat about NoSQLi, web proxies, cloud security, tips to get started in InfoSec and more. My 3 main takeaways were 1) how SQLi differs from NoSQLi 2) why privacy still matters and 3) How cookieless tracking works and some of the frightening techniques used For more information, including the show notes check out https://breachsense.io/podcast 

    54 - Jeff Foley & Asset Discovery with Amass

    Play Episode Listen Later Apr 29, 2021 26:51


            This week Jim Manico joins the show to talk about Cross Site Scripting, CSPs, strict dynamic, trusted types, SameSite cookies,  NIST SP 800-63, password shucking and more. My 3 main takeaways were 1) how to do input validation correctly 2) why using nonces in your CSP is safer than creating an allowed list policy and 3) the right way to handle passwords For more information, including the show notes check out https://breachsense.io/podcast This week Jim Manico joins the show to talk about Cross Site Scripting, CSPs, strict dynamic, trusted types, SameSite cookies,  NIST SP 800-63, password shucking and more. My 3 main takeaways were 1) how to do input validation correctly 2) why using nonces in your CSP is safer than creating an allowed list policy and 3) the right way to handle passwords For more information, including the show notes check out https://breachsense.io/podcast This week Jim Manico joins the show to talk about Cross Site Scripting, CSPs, strict dynamic, trusted types, SameSite cookies,  NIST SP 800-63, password shucking and more. My 3 main takeaways were 1) how to do input validation correctly 2) why using nonces in your CSP is safer than creating an allowed list policy and 3) the right way to handle passwords For more information, including the show notes check out https://breachsense.io/podcast This week Jim Manico joins the show to talk about Cross Site Scripting, CSPs, strict dynamic, trusted types, SameSite cookies,  NIST SP 800-63, password shucking and more. My 3 main takeaways were 1) how to do input validation correctly 2) why using nonces in your CSP is safer than creating an allowed list policy and 3) the right way to handle passwords This week Jeff Foley hangs all to talk about asset discovery using amass, recon methodologies,  hashcat style brute forcing vs. wordlists, extending functionality via the embedded Lua engine and more. My 3 main takeaways were 1) how to find assets that don't share a domain name using JARM 2) how they made scanning faster by essentially lowering the DNS brute forcing query rate and 3) what the future has in store for the project For more information, including the show notes check out https://breachsense.io/podcast 

    53 - hashcat 101

    Play Episode Listen Later Apr 15, 2021 9:14


        This week we cover a basic introduction to password cracking with hashcat. We cover why rainbow tables are no longer useful, password salts, identifying hash types, wordlists, attack modes, the rules language, secure hashing algorithms, password safes and more. For more information, including the show notes check out: https://breachsense.io/podcast

    52 - InfoSec News & Analysis

    Play Episode Listen Later Apr 8, 2021 6:26


        This week we change things up a bit and review a curated (almost) 5 minute summary of the latest InfoSec news including SolarWinds sanctions, language supply chain attacks, Egregor ransomware as a service, N.Korean crypto theft, vuln exploitation in the wild, Mexican politicians and ATM skimming, a new password manager, legal use of look-alike domains, rogue Yandex employees and SIM swapping attacks. For more information, including the show notes check out https://breachsense.io/podcast This week I offer a curated (almost) 5 minute summary of the latest InfoSec news including the Ubiquiti hack, the latest Facebook data leak, PHP's official Git repository hack, Github security tool updates, Government phishing attacks, a critical netmask NPM vuln, a Spectre/Meltdown mitigation bypass, a zero-click exploit in IoS's Mail, cryptomining Docker images and Microsoft Exchange exploits in the wild. For more information, including the show notes check out: https://breachsense.io/podcast

    51 - Jim Manico & Developing Securely

    Play Episode Listen Later Apr 1, 2021 37:04


        This week Jim Manico joins the show to talk about Cross Site Scripting, CSPs, strict dynamic, trusted types, SameSite cookies,  NIST SP 800-63, password shucking and more. My 3 main takeaways were 1) how to do input validation correctly 2) why using nonces in your CSP is safer than creating an allowed list policy and 3) the right way to handle passwords For more information, including the show notes check out https://breachsense.io/podcast 

    50 - pdp (Petko Petkov) & Automating Pownage with PownJS

    Play Episode Listen Later Mar 25, 2021 34:51


            This week pdp hangs out to chat about PownJS, SecApps, recon tool orchestration and tool development. My 3 main takeaways were 1) how to integrate PownJS into your recon process 2) his recon workflow and 3) Why JavaScript is a great language for quick PoC development For more information, including the show notes check out https://breachsense.io/podcast 

    49 - Gabrielle Botbol & Becoming a Pen Tester

    Play Episode Listen Later Mar 18, 2021 29:43


      This week Gabrielle Botbol joins the show to talk about getting into the world of pen testing, certs, CTFs, self study resources, report writing, repeatable risk scoring, finding XSS and staying current. My 3 main takeaways were 1) the CTFs you should be practicing on 2) some strategies to gain credibility in the industry and 3) which certs are worth the investment For more information, including the show notes check out https://breachsense.io/podcast 

    48 - Paulino Calderón & Practical IoT Hacking

    Play Episode Listen Later Mar 11, 2021 30:58


        This week Paulino Calderón joins the show to chat about his methodology for finding bugs in IoT devices, using Lua for quick exploit development, alarming vulnerabilities he found in a smart water bottle, extending Nmap's functionality and his tips for starting a security business. For more information, including the show notes check out https://breachsense.io/podcast

    47 - Christian Folini & The Core Rule Set

    Play Episode Listen Later Mar 4, 2021 40:31


      This week Christian Folini hangs out to talk about protecting web apps with the OWASP Core Rule Set, getting into the security industry, impedance mismatch and anomaly scoring. My 3 main takeaways were 1) how RASPs compare to WAFs 2) how paranoia levels are used to eliminate false positives and 3) how the Swiss Post used the CRS to protect a vulnerable online voting system For more information, including the show notes check out https://breachsense.io/podcast

    46 - InfoSec News & Analysis

    Play Episode Listen Later Feb 25, 2021 6:50


        This week we change things up a bit and review a curated (almost) 5 minute summary of the latest InfoSec news including SolarWinds sanctions, language supply chain attacks, Egregor ransomware as a service, N.Korean crypto theft, vuln exploitation in the wild, Mexican politicians and ATM skimming, a new password manager, legal use of look-alike domains, rogue Yandex employees and SIM swapping attacks. For more information, including the show notes check out https://breachsense.io/podcast

    45 - John Hammond & Hacking CTFs

    Play Episode Listen Later Feb 18, 2021 32:34


      This week John Hammond joins the show to talk about hacking with Python, certs vs degrees, avoiding rabbit holes and the differences between various flavors of CTFs. My 3 main takeaways were 1) how to get started with capture the flag competitions 2) dealing with burnout and 3) his methodology to analyze malware For more information, including the show notes check out https://breachsense.io/podcast

    44 - Ted Harrington & Doing Application Security Right

    Play Episode Listen Later Feb 11, 2021 37:42


      This week Ted Harrington hangs out to talk about hacking passive medical devices, predicting Ethereum private keys and exploiting business logic flaws. My 3 main takeaways were 1) Ted's 6 fundamentals of security testing 2) How do to threat modelling right and 3) His advice for starting a security company For more information, including the show notes check out https://breachsense.io/podcast

    43 - Robert "RSnake" Hansen & The Future of Data Privacy

    Play Episode Listen Later Feb 4, 2021 55:17


        This week Robert Hansen joins us to talk about privacy as a service, search engine and VPN privacy, the future of cyber-insurance, asset discovery, hackers.org and some tips on starting a security business. My 3 main takeaways were 1) the future of data privacy 2) How he used snapshots of the internet to predict stock prices and 3) what security controls he would do differently if he ran hackers.org today For more information, including the show notes check out https://breachsense.io/podcast

    42 - Charles Shirer & Pen Testing with No Money Down

    Play Episode Listen Later Jan 28, 2021 30:34


      This week Charles Shirer joins us to talk about pen testing, OSINT and how he got started in security. My 3 main takeaways were 1) when to use SecBSD as an alternative to Kali 2) How to approach pen testing APIs as opposed to web apps and 3) some tactical tips on maintaining your mental health when dealing with the pressures of InfoSec For more information, including the show notes check out https://breachsense.io/podcast

    41 - Chris Hadnagy & Human Hacking

    Play Episode Listen Later Jan 21, 2021 33:02


      This week Chris Hadnagy joins us to talk about the psychology behind social engineering, choosing effective pretexts, as well as the science behind how we make decisions. My 3 main takeaways were 1) how to identify personality types and communicate effectively using DISC 2) how Oxytocin and Amygdala hijacking influence our behavior and 3) How to get started in a career as a social engineer For more information, including the show notes check out https://breachsense.io/podcast

    40 - Fabio Viggiani & Supply Chain Attacks

    Play Episode Listen Later Jan 14, 2021 35:03


      This week Fabio Viggiani hangs out to talk about supply chain attacks, ransomware, mapping your software dependencies and assuming breach. My 3 main takeaways were 1) his insights into reverse engineering the SolarWinds Orion malware 2) Up-in-coming trends he sees in ransomware and 3) how he runs incident response investigations For more information, including the show notes check out https://breachsense.io/podcast

    39 - Josh Sokol & Managing Risk Simply

    Play Episode Listen Later Jan 7, 2021 35:45


          This week Josh Sokol joins the show talk about managing risk with a focus on keeping it simple, turning a free open source project into a business and his suggestions on how to get started in InfoSec. My 3 main takeaways were 1) the three components of risk mitigation 2) the different level of maturity within risk management programs and 3) his process for ensuring his codebase is secure For more information, including the show notes check out https://breachsense.io/podcast

    38 - Tyrone Wilson & Breaking Into the Security Industry

    Play Episode Listen Later Dec 17, 2020 27:31


      This week Tyrone Wilson hangs out to talk about breaking into the security industry, passive OSINT and starting a security business. My 3 main takeaways were 1) how to use free tools to gain experience before joining a SOC 2) how he used OSINT to find his biological father and 3) how to maintain your privacy when using exercise apps. For more information, including the show notes check out https://breachsense.io/podcast

    37 - Jenny Radcliffe & People Hacking

    Play Episode Listen Later Dec 10, 2020 36:58


      This week Jenny Radcliffe joins to the show to talk about social engineering. My 3 main takeaways were 1) which influence factors are most useful in specific situations like in person social engineering vs phishing emails 2) reading micro-expressions in context and understanding their limitations and 3) how to protect yourself against social engineering attacks. For more information, including the show notes check out https://breachsense.io/podcast

    36 - Tracy Maleeff & Empathy Based InfoSec

    Play Episode Listen Later Dec 3, 2020 40:08


              This week Tracy Maleeff hangs out to talk about using empathy to improve your InfoSec investigations. My 3 main takeaways were 1) how to collaborate OSINT findings before drawing a conclusion 2) how to communicate technical issues to a non-technical audience and 3) some tactical tips on using empathy to discover new information. For more information, including the show notes check out https://breachsense.io/podcast

    35 - Ed Bellis & Risk Based Vulnerability Management

    Play Episode Listen Later Nov 26, 2020 33:22


      This week Ed Bellis joins the show to talk about risk based vulnerability management. My 3 main takeaways were 1) which factors you should take into consideration when prioritizing vulnerability remediation 2) the effects that public exploit code has on remediation efforts 3) how organizations can improve their threat prioritization by using their own threat intel in their risk assessments For more information, including the show notes check out https://breachsense.io/podcast

    34 - John Strand & Moving Beyond 0-Days

    Play Episode Listen Later Nov 19, 2020 36:37


            This week John Strand joins the show to talk about pen testing in the age of Corona, bypassing multi-factor authentication, dealing with ransomware and starting a security business. My 3 main takeaways were 1) why 0-days don't matter 2) how to bypass identity services like Okta and 3) the one guiding rule for creating a security business For more information, including the show notes check out https://breachsense.io/podcast

    33 - Tanya Janca & Coding Securely

    Play Episode Listen Later Nov 12, 2020 32:41


          This week Tanya Janca hangs out to talk about secure coding,  supply chain security and her new book 'Alice and Bob Learn Application Security'. My 3 main takeaways were 1) how to choose the right language to develop in when starting a project 2) why we should get rid of as many different JavaScript frameworks as possible within our code base and 3) what drives someone to write a computer security book For more information, including the show notes check out https://breachsense.io/podcast

    32 - Or Katz & Phishing Evasion Techniques

    Play Episode Listen Later Nov 5, 2020 35:16


      This week Or Katz joins us to shares his research into novel phishing evasion techniques seen in the wild. My 3 main takeaways were 1) What the most popular methods to propagate phishing attacks are 2) what signals can help determine if complicated code is malicious or not and 3) How to handle potentially malicious users when we don't have enough information to understand their true intentions For more information, including the show notes check out https://breachsense.io/podcast

    31 - Chris Rock & Cyber Mercenaries

    Play Episode Listen Later Oct 29, 2020 28:09


      This week Chris Rock shares his story as well as some techniques he's used as a cyber mercenary. My 3 main takeaways were 1) why 0-days are rarely needed 2) Spear-phishing as the most efficient technique for the initial compromise 3) why the easiest path to your target may be by hacking someone else, like their accountant For more information, including the show notes check out https://breachsense.io/podcast

    30 - Hakluke & The Bug Bounty Mindset

    Play Episode Listen Later Oct 22, 2020 31:39


        This week Hakluke shares some mindset tweaks and tactical advice on how to improve your bug bounty hunting. My 3 main takeaways were 1) why the abundance mindset is so important 2) what we can learn from the similarities between the music industry and bounty hunting and 3) why collaboration is so important. For more information, including the show notes check out https://breachsense.io/podcast

    Claim The InfoSec & OSINT Show

    In order to claim this podcast we'll send an email to with a verification link. Simply click the link and you will be able to edit tags, request a refresh, and other features to take control of your podcast page!

    Claim Cancel