Episodios

  • The Author of Code War, Allie Mellen Reveals How Geo-Politics & CyberWar Collide
    Mar 16 2026

    Send a text

    Most of us are living in a digital battlefield we barely understand—until it's too late. Alli Mellen reveals how nations harness cyber tools shaped by centuries of history, and how today's chaos isn't random—it's deeply rooted in geopolitical motives. If you think cyberwarfare is just about hackers and malware, think again. Alli's insider perspective exposes the dangerous future we’re rushing toward—where AI and information manipulation could rewrite reality itself.
    In this electrifying episode, you'll discover how Russia, China, and the USA. have built (or failed to build) cyber defenses influenced by their unique social contracts and historic secrets. Alli shares jaw-dropping stories—from cyber attacks that control critical infrastructure, to disinformation campaigns that target global narratives—and explains how these tactics are evolving faster than anyone can keep up. You’ll learn why attribution is becoming impossible, how AI will blur the lines of truth, and why the cybersecurity community must wake up before the next disaster hits.


    Chapters:
    00:00 - The evolution of cybersecurity and the urgency of AI risks
    02:08 - The intersection of cybersecurity, geopolitics, and history
    05:48 - How nations like China and Russia control information via infrastructure
    08:56 - The role of cyber attacks in modern conflicts like Ukraine and Iran
    12:40 - The power of coordinated multi-domain warfare and cyber tools
    16:46 - Cultural differences in national security strategies and societal contracts
    22:11 - How authoritarian regimes manipulate internet infrastructure for control
    29:53 - The explosion of disinformation and fake content on social media
    33:00 - The future of AI in attack attribution and misinformation campaigns
    36:21 - The hidden vulnerabilities in AI systems and how bad actors exploit them
    40:45 - The terrifying leap from experimental tech to autonomous weaponry
    43:35 - The complacency of leadership in regulating emerging threats
    44:30 - Final advice: stay informed, cautious, and proactive in defending our future


    Buy The Book!: https://tinyurl.com/5f7n9n8z

    Support the show

    Follow the Podcast on Social Media!

    Tesla Referral Code: https://ts.la/joseph675128

    YouTube: https://www.youtube.com/@securityunfilteredpodcast

    Instagram: https://www.instagram.com/secunfpodcast/
    Twitter: https://twitter.com/SecUnfPodcast

    Affiliates
    ➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh
    ➡️ OffGrid Coupon Code: JOE

    ➡️ Unplugged Phone: https://unplugged.com/
    Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout

    *See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.

    Más Menos
    46 m
  • The Great Cyber Power Struggle: Russia, China, Iran, and the Coming Digital Chaos
    Mar 10 2026

    Send a text

    The cybersecurity battlefield is evolving at a lightning pace—and in 2025, we saw threats go from sophisticated to unstoppable. Identity has become the new frontline, with hackers weaponizing OAuth tokens, SaaS integrations, and impersonations to breach even the most secure environments. But here’s the brutal truth: if you’re not prepared for these attack vectors, you’re already one step behind.
    In this electrifying episode, Sergey Novikov, CyberProof’s director of cyber security content, exposes the shocking shifts that are defining 2025’s cyber landscape—and why you can’t afford to ignore them. He reveals how nation-states are collaborating openly in a cyber arms race, blending espionage, financial theft, and disruptive operations into devastating hybrid attacks. AI isn’t just an overhyped buzzword anymore; it’s turbocharging ransomware, automating infiltration, and lowering the bar for low-skill hackers to launch advanced, lightning-fast attacks.
    You’ll discover:
    How identity has overtaken infrastructure as the primary attack surface, and what this means for your organization’s defenses.
    The dangerous collaboration among state-sponsored groups—blurring lines between espionage and cybercrime—and why it’s shaping the next wave of threats.
    Surprising insights on supply chain attacks targeting SaaS platforms and third-party vendors—plus real-world examples like the water supply hack that could have poisoned millions.
    The terrifying rise of AI-driven autonomous attacks capable of multi-step, pincer-movement operations with minimal human intervention.
    Why the global cyber power struggle—especially between nations like Russia, China, and Iran—will spill over into the digital realm even more aggressively in 2026.
    This isn’t just another “cybersecurity forecast”—it’s a wake-up call. If you’re serious about protecting your business, personal data, or even your family from the chaos coming next year, this episode is your first line of defense.
    Sergey Novikov isn’t just talking theory; he’s a top cybersecurity thought leader, unraveling the complex tactics used by today’s cyber adversaries and sharing hard truths about where we’re headed.
    Are you ready to face the terrifying realities of tomorrow’s cyber world? If you’re a security professional, a business owner, or anyone who depends on digital trust, you cannot afford to miss this.
    Tune in now. Get informed. Get prepared. The future of cybersecurity starts today.

    Support the show

    Follow the Podcast on Social Media!

    Tesla Referral Code: https://ts.la/joseph675128

    YouTube: https://www.youtube.com/@securityunfilteredpodcast

    Instagram: https://www.instagram.com/secunfpodcast/
    Twitter: https://twitter.com/SecUnfPodcast

    Affiliates
    ➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh
    ➡️ OffGrid Coupon Code: JOE

    ➡️ Unplugged Phone: https://unplugged.com/
    Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout

    *See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.

    Más Menos
    40 m
  • Hackers Cracked AI Security | Here's How They Did It
    Feb 18 2026

    Send a text

    Most cybersecurity stories talk about the hacks, but this episode peels back the curtain on the raw, unfiltered journey of a hacker turned industry pioneer. Jason Haddix shares how his early days of hex editing and fake IDs evolved into leading offensive security at Fortune 100 giants — all driven by relentless curiosity and defiance. His tales of surviving the shadowy underground, navigating multi-year career pivots, and turning obsession into innovation will blow your mind. This isn’t just about tech — it’s about fearlessly forging a path in a chaotic, ever-changing world where knowledge is power and resilience is everything.

    You'll discover the secret frameworks behind modern pen testing—like the Bug Hunters Methodology—and how cutting-edge tools are reshaping cybersecurity. Jason dives into his real-world battles: from bypassing the most sophisticated security measures to hacking into critical infrastructure under intense pressure. His insights reveal the brutal truths of red teaming, physical infiltration, and the mental grit required to succeed when everyone else doubts you.

    We break down the rise of AI and LLMs in security: how attackers jailbreak systems, bypass defenses with prompt injections, and weaponize new technologies faster than security teams can respond. Jason warns about deploying these powerful tools without enough guardrails or understanding — and how FOMO is fueling a wild, unsecured frontier. His perspective is a call to arms for defenders and hackers alike: adapt fast, think boldly, and stay one step ahead in the most dangerous cyber game yet.

    This episode is essential for anyone hungry to understand the raw reality of offensive security, the future of AI in hacking, and the relentless pursuit of mastery in a digital battlefield. Whether you're a seasoned pro, a curious newcomer, or a business leader, Jason’s fearless authenticity will challenge your assumptions and ignite your passion to innovate. Hit play — your fight for security starts now.

    Chapters

    00:00 Introduction and Background in Cybersecurity
    06:05 Early Experiences and Learning in Cybersecurity
    12:14 Transitioning to Professional Penetration Testing
    18:30 Challenges and Realities of Consulting in Cybersecurity
    20:41 Phishing Tests and Their Consequences
    23:09 Transitioning to Entrepreneurship
    26:05 The Evolution of Training and Consulting
    31:18 The Role of AI in Cybersecurity
    39:11 Navigating AI Security Challenges
    39:11 Understanding LLMs and User Education
    41:42 Privacy Concerns and Risk Management in AI
    44:32 Prompt Engineering Vulnerabilities and Jailbreaking Techniques
    47:03 Security Challenges in AI Systems
    49:39 Future of AI and Community Engagement

    Support the show

    Follow the Podcast on Social Media!

    Tesla Referral Code: https://ts.la/joseph675128

    YouTube: https://www.youtube.com/@securityunfilteredpodcast

    Instagram: https://www.instagram.com/secunfpodcast/
    Twitter: https://twitter.com/SecUnfPodcast

    Affiliates
    ➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh
    ➡️ OffGrid Coupon Code: JOE

    ➡️ Unplugged Phone: https://unplugged.com/
    Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout

    *See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.

    Más Menos
    54 m
  • The Role of Lawyers in Cybersecurity Aren't What You Think — Here's Why It Matters
    Feb 3 2026

    Send a text

    Most cybersecurity talks focus on technical solutions, but this episode reveals a game-changing perspective: building trust is at the core of cybersecurity success. Danielle Sheer, Chief Trust Officer at Commvault, shares how her legal background and emotional connection strategies transform organizations’ approach to security—making cybersecurity relatable, manageable, and resilient.

    You'll discover:

    The surprising skills lawyers develop that elevate cybersecurity leadership—like seeing multiple sides of a problem and translating complex threats into business language.
    How trust, not just technology, is the secret to effective security—why relationships matter more than firewalls alone.
    Practical insights on handling breaches, from crisis communication to resilience strategies that go beyond spending more.
    The role of AI in expanding the threat landscape, and why understanding and simplifying cybersecurity is crucial as attacks get more advanced.
    Why the future of cybersecurity hinges on your ability to foster trust, build internal alignment, and communicate clearly across technical and non-technical teams.
    If you're a security professional, a leader trying to bridge the tech-human gap, or anyone interested in how trust can be your greatest shield—this episode is your must-listen. Danielle Sheer’s unique journey from law to security offers lessons on leadership, relationship-building, and proactive resilience that could redefine how your organization defends itself in a digital age.

    Timestamps:
    00:00 - Introduction to Danielle Sheer and her career journey
    02:07 - From law to leadership: Building emotional connections and trust
    04:28 - Defining the Chief Trust Officer role and its organizational value
    05:59 - Skills gained in law school that translate across industries
    08:38 - The importance of perspective-taking and storytelling in cybersecurity
    09:34 - Strategies for communicating cybersecurity issues effectively to non-technical stakeholders
    11:53 - Managing internal security processes and building trust through transparency
    13:12 - The anatomy of breaches and translating between technical and business language
    15:24 - The importance of resilience, employee education, and business continuity plans
    17:00 - Conducting effective tabletop exercises and lessons from breach simulations
    20:36 - Ransomware payments and industry responses to emerging threats
    22:29 - How AI is transforming cybersecurity: skill gaps and threat detection challenges
    26:13 - State-sponsored attacks, malware timelines, and geopolitical cybersecurity concerns
    28:37 - The need for global cooperation and continuous vigilance in cybersecurity
    30:27 - Final thoughts: connecting organizations and sharing resources

    Support the show

    Follow the Podcast on Social

    Support the show

    Follow the Podcast on Social Media!

    Tesla Referral Code: https://ts.la/joseph675128

    YouTube: https://www.youtube.com/@securityunfilteredpodcast

    Instagram: https://www.instagram.com/secunfpodcast/
    Twitter: https://twitter.com/SecUnfPodcast

    Affiliates
    ➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh
    ➡️ OffGrid Coupon Code: JOE

    ➡️ Unplugged Phone: https://unplugged.com/
    Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout

    *See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.

    Más Menos
    39 m
  • Agentic Robots Are Here—And Your Security Strategy Is Broken with Ben Wilcox
    Jan 27 2026

    Send a text

    In this episode, Joe and Ben Wilcox dive into the rapid advancements in AI and technology, sharing insights from the recent Microsoft Ignite conference. They explore the transformative impact of AI on security practices, the evolution of agentic robots, and the growing importance of data security in today's digital landscape. Tune in to hear a lively discussion between an AI skeptic and an optimist, and discover how these technological shifts are reshaping business and innovation.

    Support the show

    Follow the Podcast on Social Media!

    Tesla Referral Code: https://ts.la/joseph675128

    YouTube: https://www.youtube.com/@securityunfilteredpodcast

    Instagram: https://www.instagram.com/secunfpodcast/

    Twitter: https://twitter.com/SecUnfPodcast

    Affiliates
    ➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh
    ➡️ OffGrid Coupon Code: JOE

    ➡️ Unplugged Phone: https://unplugged.com/
    Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout

    *See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.

    Support the show

    Follow the Podcast on Social Media!

    Tesla Referral Code: https://ts.la/joseph675128

    YouTube: https://www.youtube.com/@securityunfilteredpodcast

    Instagram: https://www.instagram.com/secunfpodcast/
    Twitter: https://twitter.com/SecUnfPodcast

    Affiliates
    ➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh
    ➡️ OffGrid Coupon Code: JOE

    ➡️ Unplugged Phone: https://unplugged.com/
    Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout

    *See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.

    Más Menos
    51 m
  • Building Safer Online Habits Without Becoming Paranoid
    Jan 19 2026

    Send a text

    We trade office chaos for focused remote work, then chart the journey from a 1999 idea to one of security’s most-used tools. The talk widens to cyber warfare, scams, and practical privacy steps anyone can take without going off-grid.

    • year-end boundaries and remote work focus
    • origin of WhatIsMyIPAddress and staying humble
    • don’t invite hackers, real-world conference fallout
    • elite cyber training, Ukraine drones, satellite comms
    • podcast guest vetting, authenticity, and value
    • preventing scams, empathy for victims, proof problems
    • privacy without becoming a hermit, actionable steps
    • 2FA on email, credit freezes, password strategy
    • data collection at retail, saying no with confidence
    • ads as social engineering, better defaults online

    “I will give anyone who wants the book can come to my website and get the book… If you don’t want to give me your email address or your name, I’ll give you the book without the email address and your name.”

    Support the show

    Follow the Podcast on Social Media!

    Tesla Referral Code: https://ts.la/joseph675128

    YouTube: https://www.youtube.com/@securityunfilteredpodcast

    Instagram: https://www.instagram.com/secunfpodcast/
    Twitter: https://twitter.com/SecUnfPodcast

    Affiliates
    ➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh
    ➡️ OffGrid Coupon Code: JOE

    ➡️ Unplugged Phone: https://unplugged.com/
    Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout

    *See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.

    Más Menos
    49 m
  • The Grind and Growth: A Podcaster's Journey With Jack Rhysider From Darknet Diaries
    Jan 12 2026

    Send us Fan Mail

    Ever wonder why some shows last for years while others fade before episode seven? We sit down with Jack from Darknet Diaries to unpack the systems, mindset, and storytelling choices that keep a podcast resilient without burning out the host. Instead of chasing viral spikes, Jack lays out a playbook for steady growth: batch recording, rest cycles, and that deceptively powerful one percent month-over-month target. It’s practical, humane, and it works.

    We dig into his editorial compass with three distinct tracks: personal obsessions, proven crowd favorites, and bold forays into new communities like crypto and gaming. Jack explains why listeners often prefer penetration test stories over higher-stakes CIA operations, and what it takes to earn trust from niche audiences by learning their culture first. The curtain pulls back on hard-to-book guests, silent PR walls, and the rare times a source vanishes after recording—plus the elusive thrill of chasing “ghost” hackers who should never speak on record.

    From there, the conversation turns to craft. Jack’s background as a network security engineer sharpened his ability to explain complex topics simply. He shares how layered explanations let beginners and veterans both feel seen, why command line beats screenshot soup, and how relentless revision turns knowledge into clarity. We also tackle AI and cybersecurity with nuance: not as job eraser, but capability amplifier. Think better triage, secure-by-default coding, and an arms race where defenders and attackers wield similar tools—and the edge comes from better questions and stronger priorities.

    Beyond the studio, Jack talks health, music, language learning, and swing dance, and how a wetware mindset—designing stories to trigger empathy and memory—guides every episode. If you care about making work that lasts, telling stories that land, and adopting AI without losing the plot, this conversation is a masterclass in sustainable creativity and modern security. Subscribe, share with a friend who needs a morale boost, and leave a review with the one tactic you’ll try next.


    Darknet Diaries: https://www.youtube.com/jackrhysider


    Support the show

    Follow the Podcast on Social Media!

    Tesla Referral Code: https://ts.la/joseph675128

    YouTube: https://www.youtube.com/@securityunfilteredpodcast

    Instagram: https://www.instagram.com/secunfpodcast/
    Twitter: https://twitter.com/SecUnfPodcast

    Affiliates
    ➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh
    ➡️ OffGrid Coupon Code: JOE

    ➡️ Unplugged Phone: https://unplugged.com/
    Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout

    *See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.

    Más Menos
    49 m
  • Your Next Hire Might Be a Deepfake With Brian Long CEO of Adaptive Security
    Jan 5 2026

    Send a text

    In this episode, Joe sits down with Brian Long, CEO of Adaptive Security, to delve into the evolving landscape of cybersecurity, focusing on the alarming rise of AI-powered social engineering attacks. Brian shares insights from his extensive experience, highlighting the sophisticated tactics used by attackers, including deep fake technology and AI agents. They discuss the challenges organizations face in adapting to these threats and the importance of awareness and robust security controls. Tune in to learn about the future of cybersecurity and how companies can better prepare for the next wave of digital threats.

    00:00 Introduction to Security Challenges
    04:08 AI-Powered Social Engineering Threats
    09:45 The Opaque Nature of Cybersecurity Incidents
    14:08 Deep Fakes and Their Evolution
    18:48 Hiring Risks in the Age of Deep Fakes
    23:00 The Future of Cyber Threats and Anarchy
    28:04 The Arms Race: AI Detection vs. Deepfakes
    32:49 Preparing for the Future: Awareness and Training
    39:26 The Evolving Threat Landscape: Beyond Traditional Security

    https://www.adaptivesecurity.com/

    https://www.linkedin.com/in/brianclong/

    Support the show

    Follow the Podcast on Social Media!

    Tesla Referral Code: https://ts.la/joseph675128

    YouTube: https://www.youtube.com/@securityunfilteredpodcast

    Instagram: https://www.instagram.com/secunfpodcast/
    Twitter: https://twitter.com/SecUnfPodcast

    Affiliates
    ➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh
    ➡️ OffGrid Coupon Code: JOE

    ➡️ Unplugged Phone: https://unplugged.com/
    Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout

    *See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.

    Más Menos
    44 m