AI-Powered Application Penetration Testing—Scale Security Without Compromise Learn More

Podcast

Podcast

Trusted Tools, Hijacked Sessions & Cheap Paths to Big Access

Trusted Tools, Hijacked Sessions & Cheap Paths to Big Access

In this Initial Access episode, we look at how attackers are reusing trust that is already in place, from hijacked sessions and malicious browser extensions to overlooked industrial systems infrastructure and tightly controlled AI capabilities.

Learn More
Podcast

Project Glasswing: AI Vulnerability Discovery & Exploit

Project Glasswing: AI Vulnerability Discovery & Exploit

In this Initial Access podcast episode, we break down what Anthropic’s Project Glasswing actually shows about AI-driven vulnerability discovery and where human expertise still matters.

Learn More
Podcast

GitHub Malware, DNS Hijacking, Ransomware Speed & AI Exploits

GitHub Malware, DNS Hijacking, Ransomware Speed & AI Exploits

In this Initial Access podcast episode, we examine how trust, speed, and automation are reshaping initial access across software supply chains, network infrastructure, and AI systems.

Learn More
Podcast

Inherited Access, AI Permissions, Supply Chain Attacks & Edge Exposure

Inherited Access, AI Permissions, Supply Chain Attacks & Edge Exposure

In this Initial Access podcast episode, we examine how attackers are inheriting access through trusted systems, default permissions, and unpatchable infrastructure.

Learn More
Podcast

Malvertising, Trusted Tools, Real-Time Attacks & Shrinking Windows

Malvertising, Trusted Tools, Real-Time Attacks & Shrinking Windows

In this Initial Access podcast episode, we examine how attackers are turning normal workflows and trusted systems into reliable paths for initial access as exploitation timelines continue to shrink.

Learn More
Podcast

Speed, Trust, and the Compromised Workbench

Speed, Trust, and the Compromised Workbench

In this Initial Access podcast episode, we explore how attackers are collapsing timelines and exploiting trust relationships, turning developer environments into the fastest path to full compromise, and where defenders still have room to slow them down.

Learn More
Podcast

Social Engineering, Phishing-as-a-Service, Edge Device Exploits & AI-Assisted Attacks

Social Engineering, Phishing-as-a-Service, Edge Device Exploits & AI-Assisted Attacks

In this Initial Access podcast episode, we examine how attackers are gaining initial access through social engineering, identity abuse, and vulnerable edge infrastructure.

Learn More
Podcast

AI Coding Agents, FortiGate Attacks, Surveillance & Identity Hacks

AI Coding Agents, FortiGate Attacks, Surveillance & Identity Hacks

In this Initial Access podcast episode, we cover AI coding agents operating inside developer environments, automated attack platforms accelerating exploitation cycles, long-lived connected devices exposing unexpected telemetry risks, and why identity systems remain the primary entry point for attackers.

Learn More
Podcast

Autonomous AI, Broken Guardrails, and Geopolitics

Autonomous AI, Broken Guardrails, and Geopolitics

In this Initial Access podcast episode, we cover autonomous vulnerability discovery, AI agents that ignore instructions, and why models are becoming strategic national assets.

Learn More
Podcast

SSO Phishing, Patching Failures, Exposed APIs

SSO Phishing, Patching Failures, Exposed APIs

In this Initial Access podcast episode, we cover SSO phishing, patching failures, exposed APIs, and zombie infrastructure remind us that basic security hygiene still decides the outcome.

Learn More
Podcast

Deepfakes, Spyware Kits, and LLMs for Hire

Deepfakes, Spyware Kits, and LLMs for Hire

In this Initial Access podcast episode, we cover prompt injection, a hijacked Outlook add-in, commoditized mobile spyware, AI executive deepfake scams, IT-to-OT pivoting, and nation-state use of commercial LLMs to accelerate exploitation.

Learn More
Podcast

Software Policy Rollbacks, Insider Access Abuse, and AI Automation Risk

Software Policy Rollbacks, Insider Access Abuse, and AI Automation Risk

In this Initial Access podcast episode, we cover the rollback of federal software security guidance, insider-driven access risks, ongoing state-sponsored espionage, and the security implications of giving AI tools deep control over infrastructure.

Learn More
Podcast

Prompt Injection, Session Hijacking, and Why AI Isn't Writing the Attack Plans Yet

Prompt Injection, Session Hijacking, and Why AI Isn't Writing the Attack Plans Yet

In this Initial Access podcast episode, we cover AI prompt injection risks, continued social engineering via LinkedIn and QR codes, credential theft and session hijacking, patch reliability and appliance security, and how AI is being used to accelerate malware development—distinguishing meaningful risk from overhyped claims.

Learn More

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.