Podcast Episodes

Back to Search
Salesforce Under Fire: The Salesloft Drift Supply-Chain Breach

Salesforce Under Fire: The Salesloft Drift Supply-Chain Breach



In this episode, we discuss a recent significant cyber attack where Palo Alto Networks experienced a data breach through their Salesforce environment due to a compromised SalesLoft drift integration.…


Published on 9 hours ago

Convenience vs. Privacy: Can We Have Both?

Convenience vs. Privacy: Can We Have Both?



In this episode, we discuss if the convenience of modern technology compromises our privacy. Inspired by a thought-provoking Reddit post, we explore how everyday actions like saving passwords, enabli…


Published on 1 week ago

Public Wi-Fi Myths: Why You’re Probably Safer Than You Think

Public Wi-Fi Myths: Why You’re Probably Safer Than You Think



Public Wi-Fi has a bad reputation — but in 2025, the “you’ll get hacked instantly” fear is largely outdated. In this episode, Tom and Kevin dig into real research and modern protections that make mos…


Published on 2 weeks ago

The Tea App Hack: How a “Safe” Space Leaked 13,000 ID Photos & 1.1M Messages

The Tea App Hack: How a “Safe” Space Leaked 13,000 ID Photos & 1.1M Messages



In this episode we’re discussing the alarming breach of the Tea app, a platform intended for women to share dating experiences. The hack resulted in the exposure of over 13,000 government ID photos, …


Published on 3 weeks ago

Random Smishing Text Scams: Why “Do I Know You?” Texts Are Dangerous

Random Smishing Text Scams: Why “Do I Know You?” Texts Are Dangerous



In this episode, we discuss a rising scam involving random smishing text messages. Learn how these messages work, why they’re effective, and what you can do to protect yourself. Discover the dangers …


Published on 4 weeks ago

Leaked, Patched, and Still Hacked: The SharePoint Zero-Day Crisis

Leaked, Patched, and Still Hacked: The SharePoint Zero-Day Crisis



This week we explore the recent Microsoft SharePoint vulnerability that has led to widespread exploitation by ransomware gangs and Chinese State-sponsored hackers. We also cover the confirmed comprom…


Published on 1 month ago

Doorbells, Dystopia, and Digital Rights: The Ring Surveillance Debate

Doorbells, Dystopia, and Digital Rights: The Ring Surveillance Debate



In this episode, we examine Amazon’s Ring doorbell camera amid rising privacy concerns and policy changes. The Electronic Frontier Foundation’s recent report criticizes Ring’s AI-first approach and t…


Published on 1 month, 1 week ago

Passwords and the Elderly: Why Writing Them Down Might Be OK

Passwords and the Elderly: Why Writing Them Down Might Be OK



In this episode, join hosts Tom Eston, Scott Wright, and Kevin Johnson as they discuss the controversial topic of seniors writing down passwords. They discuss how threat modeling differs for the elde…


Published on 1 month, 2 weeks ago

The Google Workspace Security Gap: Why Traditional Tools Fall Short

The Google Workspace Security Gap: Why Traditional Tools Fall Short



In this episode, we discuss the often overlooked security issues within Google Workspace. Rajan Kapoor, Field CISO at Material Security, joins us to talk about how Material Security is redefining the…


Published on 1 month, 3 weeks ago

Autonomous Hacking? This Startup May Have Just Changed Penetration Testing Forever

Autonomous Hacking? This Startup May Have Just Changed Penetration Testing Forever



In this episode, we explore the revolutionary concept of autonomous penetration testing with a discussion into Cybersecurity startup XBOW’s recent breakthrough. XBOW claims to have topped HackerOne’s…


Published on 2 months ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate