Shared Security Podcast
Exploring the bonds shared between people and technology
Educating the Next Cybersecurity Generation with Tib3rius
Tom Eston | | Application Security, AppSec, Bug Bounties, bug bounty, Burp Suite, career, Content Creation, Cyber Security, Cybersecurity, cybersecurity career, Data Privacy, Digital Privacy, Episodes, hacker, Hacking, Information Security, Infosec, penetration tester, Penetration Testing, pentesting, Podcast, Podcasts, Privacy, security, TCM Security, technology, Tib3rius, training, Veracode, Web App Hacking, Web Application Hacking, web applications, Web Apps, Weekly Edition
In this episode we explore the remarkable journey of Tib3rius, a web application hacking expert and content creator. In this engaging conversation, we discuss: Tib3rius’ passion for community education and content creation ...
Your Car is a Privacy Nightmare, Password Creation Best Practices, Sony Hacked Again
Tom Eston | | Automotive, Car Privacy, Car security, cars, clop, clop-ransomware, Cyber Security, Cybersecurity, Data breach, Data Broker, Data Brokers, Data Collection, Data Privacy, Digital Privacy, Episodes, Information Security, Infosec, Mozilla, Password, password complexity, Password Creation, passwords, Podcast, Podcasts, Privacy, Ransomware, research, security, Sony, surveillance, technology, Weekly Edition
In this episode, we discuss the Mozilla Foundation’s alarming report that reveals why cars are the top privacy concern. Modern vehicles, equipped with data-collecting tech, pose significant risks to consumers’ privacy, with ...
Is My Boss Spying on Me, Instagram Painting Scam, Kia and Hyundai TikTok Challenge
Tom Eston | | AI, Car theft, Car Thefts, cars, Cyber Security, cybercriminals, Cybersecurity, Data Privacy, Digital Privacy, Episodes, Hyundai, Hyundai Challenge, Information Security, Infosec, Instagram, Kia, Kia and Hyundai Challenge, Kia Challenge, Painting Scam, Podcast, Podcasts, Privacy, scam, Scams, security, social media, surveillance, technology, TikTok, Viral, Weekly Edition, Workplace, Workplace Surveillance
In this episode, we explore the growing trend of AI surveillance in corporations, where cutting-edge technology is used to monitor employees, optimize productivity, and raise ethical concerns. Next, we uncover a disturbing ...
Content Creation, Mental Health in Cyber, The MGM Ransomware Attack
Tom Eston | | Content Creation, Content Creator, Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, Episodes, Information Security, Infosec, Matt Johansen, Mental Health, MGM, Orign Story, Podcast, Podcaster, podcasting, Podcasts, Privacy, Ransom, Ransomware, ransomware attack, security, Security Twits, Shmoocon, technology, Twitter, Vulnerable U, Weekly Edition, X, YouTube
In this episode Matt Johansen, Security Architect at Reddit and Vulnerable U newsletter and YouTube content creator, joins host Tom Eston to discuss Matt’s background as one of the original “Security Twits”, ...
The Changing Role of the CISO with Ryan Davis, Chief Information Security Officer at NS1
Tom Eston | | challenge, challenges, chief information security officer, Chief Security Officer, CISO, CSO, Cyber Security, Cybersecurity, Data breach, Data breaches, Data Privacy, Digital Privacy, economy, Episodes, IBM, Industry, Information Security, Infosec, Learning, NS1, Podcast, Podcasts, Privacy, Ransomware, Ryan Davis, security, technology, Veracode, Weekly Edition
In this episode Ryan Davis, Chief Information Security Officer at NS1, speaks with host Tom Eston about the changing role of the CISO, acquisitions, what the biggest challenges are, and Ryan’s advice ...
The FBI’s Qakbot Takedown, QR Code Phishing Attacks, Dox Anyone in America for $15
Tom Eston | | 404 Media, botnet, botnets, Credit Bureaus, credit card, Credit Header Information, Cyber Security, Cybersecurity, Data Exploitation, Data Privacy, Digital Privacy, doxing, Energy, Episodes, FBI, Fraud, Information Security, Infosec, personal data, Phishing, Podcast, Podcasts, Privacy, Qakbot, QR, QR code, QR Code Phishing, Ransomware, security, Security Awareness, social engineering, technology, Transunion, Weekly Edition
In this episode we discuss the FBI’s remarkable takedown of the Qakbot botnet, a saga involving ransomware, cryptocurrency, and the FBI pushing an uninstaller to thousands of victim PCs. Next, we explore ...
SaaS Attacks: Compromising an Organization without Touching the Network
Tom Eston | | Attack Framework, attacker, blue team, Cloud, Cloud Penetration Testing, cloud-based, Compromise, Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, Episodes, hacker, Hacking, Information Security, Infosec, lateral movement, Luke Jennings, MITRE ATT&CK, MITRE ATT&CK Framework, network, network attacks, Network penetration testing, Podcast, Podcasts, Privacy, Push Security, Red Team, SaaS, SaaS Application, SaaS Attacks, security, Software-as-a-Service, Special Editions, technology, Weekly Edition
In this episode Luke Jennings VP of Research & Development from Push Security joins us to discuss SaaS attacks and how its possible to compromise an organization without touching a single endpoint ...
Back to School Cybersecurity, Phishing Pitfalls and Strategies, X’s (Twitter) Blocking Overhaul
Tom Eston | | back to school, blocking, Blocking Content, Blocking People, Cyber Security, Cybersecurity, Data Privacy, Digital Privacy, education, Elon Musk, Episodes, Information Security, Infosec, Phishing, Phishing Prevention Tips, Podcast, Podcasts, Privacy, safety, school, security, students, Teachers, technology, tips, Twitter, Weekly Edition, X
In this episode, we discuss essential cybersecurity tips for students and educational institutions as they gear up for the school season. From software updates to strong passwords and cybersecurity education, we explore ...
Business Email Compromise Scams Revisited
Tom Eston | | bec, business email compromise, Cybersecurity, Data Privacy, Digital Privacy, Episodes, FBI, Identity Theft, Information Security, Infosec, Podcast, Privacy, Scams, security, technology, theft, Weekly Edition
In this best of episode from December 2021, we revisit Business Email Compromise (BEC) scams. What are they, how to identify them, and why BEC scams have resulted in well over $3 ...
The Current and Future State of Email Security with Andy Yen, CEO of Proton
Tom Eston | | Andy Yen, Cybersecurity, Data Privacy, Digital Privacy, email, email security, Episodes, Information Security, Infosec, Password, password manager, passwords, Podcast, Privacy, proton, Proton Mail, Proton Pass, Proton VPN, security, technology, VPN, Weekly Edition
In this episode, host Tom Eston speaks with Andy Yen, founder and CEO of Proton, to discuss the current and future state of email security. We also discuss Andy’s unique background as ...