
Project Glasswing Podcast
Project Glasswing is a technology podcast covering the ideas, threats, and systems shaping the digital world. Each episode can move across c...
Radio and PodcastLive Radio & PodcastsOpening Radio and Podcast...

Radio and PodcastLive Radio & PodcastsFetching podcast shows and categories...
Radio and PodcastLive Radio & PodcastsFetching podcast episodes...

Dr. Chaos Cyber Security Podcast

Project Glasswing is a technology podcast covering the ideas, threats, and systems shaping the digital world. Each episode can move across c...

A technical recap of RSA 2026 covering the biggest security themes, AI developments, vendor narratives, and the signals defenders should not...

We explore the transformative impact of AI on insider threat dynamics. Learn about how AI agents manipulate systems and evade detection thro...

Join us as we catch up on recent discussions highlighting the significant and evolving cyber threat posed by Iran, featuring insights from c...

Unpacking Cybersecurity Careers by Dr. Chaos

Tony G and Aamir discuss their frustrations in the world of cybersecurity. Join us as we discuss the multiple failures we have seen in the i...

John Simmons joins the Dr. Chaos podcast. John is an IR specialist. He has worked with the United States White House, other government agenc...

Janet Jackson is her CVE as Rhythm Malware Nation destroys hard drives. Log4J might be giving Iranian attackers the upper hand. Tony G and A...

We are back at Blackhat and Defcon 2022 Las Vegas. Aamir and Tony discuss the conference, what they enjoyed, and little nuggets of informati...

A new threat actor goes destructive

Two UK teenagers were charged with hacking and being members of Lapsus$ the Dr. Chaos podcast discusses motivations around why teenagers and...

A Closer Look at the LAPSUS$ Data Extortion Group. In the latest edition, we talk about their latest attacks, some of the techniques being u...

Russian threat actor Conti has their data leaked. In this podcast, we will take a look at the leaked data and see what we can learn about on...

Ransom payments are tax-deductible, and no one cares. Should we? https://www.foxbusiness.com/lifestyle/ransomware-attack-payment-tax-deducti...

We are honored to have Dr. Alex Tarter, CTO of Thales UK and co-founder of TurgenSec, and Breaches.UK on our podcast. Alex is a bit of a leg...

Tony G and Aamir Lakhani discuss their long week of investigating remote work cyber attacks, the craziness of ransomware, the Colonial Pipel...

Tony G and Aamir Lakhani discuss the Microsoft Exchange Zero-Day vulnerabilities.

Tony G and Dr. Chaos return to discuss what is XDR. Is it just hype? Is it more than repackaged tools? Let's break down the new industry buz...

Aamir Lakhani and Tony G discuss breach attack simulation tools on this week's episode. Learn about the differences between breach attack si...

This week we conclude our exciting interview with Jim. This former US Intelligence cyber specialist discusses attribution challenges to Stat...

Attacks, Cyberwar, and Attack Attribution from the perspective of a cyber professional who spent years working for US Intelligence organizat...

Tony G and Jonas Walker explain how ransomware negations occur between a victim and an attacker. Learn how a travel management company negot...

Chris Louie (https://www.linkedin.com/in/chlouie/) blogger and security professional from zScaler speaks to us on today's podcast about all...

We discuss online and free resources that are available to learn Cybersecurity skills. Special co-host Jonas Walker joins us as he discusses...

The financial sector takes cybersecurity seriously, and almost no one takes it more seriously than Chris Konrad, World Wide Technology Direc...

Industrial cybersecurity specialist James Cabe from CyberX, discusses ICS attacks, OT vs IT, and working for a startup that just got acquire...
Industrial Cybersecurity Specialist James Cabe at CyberX, talks about ICS attacks, the differences between IT and OT security, and his exper...

Researchers Aamir Lakhani and Anthony Giandomenico discuss the EKANS ransomware and why it was an effective and targetted attack.

Aamir Lakhani and Tony G discuss the latest findings of the 2020 Verizon Data Breach report. From ransomware to passwords dumpers. What does...

Welcome to the world of chaos. In this special episode, we repost audio from a recent interview, where your co-host Dr. Chaos, discussing ho...

The Information Technology Disaster Resource Center harnesses the collective resources of the technology community to provide no-cost Inform...

Cybersecurity startups are providing excellent opportunities for people who want to create and bring to market new products. They can also b...

Do you have what it takes to investigate cyber breaches, data exfiltration, and attacks? How does one get started in the career of incident...

How do you hire, manage, and interact with the best engineers when they work for you? Join John Jacobs (known as JJ), who is an experienced...

What if your first cybersecurity certification was the toughest one to get? How would it impact your career? What would be your next steps?...

How Threat Landscape has Changed with COVID-19. Aamir Lakhani and Derek Manky discuss the thread landscape and flattening the cyber curve.

We answer your questions around cybersecurity, COVID-19, and RDP vulnerabilities.

Today's topic on the Dr. Chaos Cybersecurity podcast is Enterprise Segmentation. Enterprise Segmentation is a hot topic as organizations rac...

Brandon Robinson discusses the next steps for the IT professional to elevate their career. Listen to his tips on how to think outside the bo...

On this week's podcast, my co-host Tony G is back! Join us as we interview Jack Chan, product manager at Fortinet. Jack discusses his though...

Keith Rayle left his perfect job to take on the role of a CISO. What could possibly go wrong in a brand new city, brand new job, and a world...

RDP Goes Bad and Frankenstein - Dr. Chaos Podcast June 5th, 2019 by Dr. Chaos

We just got back from Mitre ATT&CK Con. Tony G and Dr. Chaos were both impressed. Let's talk about creating and testing the ATT&CK framework...

Tony G and Dr. Chaos discuss crypojacking - is it really a problem? How does it lead to greater security threats? What does it really mean f...

Aamir Lakhani and Tony G talk around MITRE ATT&CK methodology and malware embedded in DLL

Aamir Lakhani and "Tony G" discuss the latest techniques in new botnets with hive like awareness.

I sit down and talk to Keith Rayle around AI and Machine Learning

Keith Rayle, a senior security advisor gives a detailed presentation on how AI and Machine learning works for the masses

Is CryptoJacking really that bad? What about sites that are asking for user's permission before they mine? Tony G and Dr. Chaos discuss Cryp...

Organizations of all sizes continue to be targets of cyber criminals and the threats that they present. However, some organizations are taki...