エピソード

  • Speed, Trust, and the Compromised Workbench
    2026/03/25

    In this Initial Access podcast episode, the team looks at several recent examples of that compression in action, from a supply chain compromise that led to AWS admin access, to malware spreading through GitHub, npm, and VS Code, to ClickFix lures that convince technical users to run malicious commands themselves.

    続きを読む 一部表示
    36 分
  • Social Engineering, Phishing, Edge Device Exploits & AI-Assisted Attacks
    2026/03/15

    In this Initial Access episode, we examine how attackers are gaining initial access through social engineering, identity abuse, and vulnerable edge infrastructure. The team also discusses the rise of phishing-as-a-service platforms, leaked mobile exploit chains entering the criminal ecosystem, and how AI is accelerating reconnaissance and offensive tooling for both attackers and defenders.

    続きを読む 一部表示
    37 分
  • AI Coding Agents, FortiGate Attacks, Surveillance & Identity Hacks
    2026/03/15

    In this Initial Access podcast episode, we cover AI coding agents operating inside developer environments, automated attack platforms accelerating exploitation cycles, long-lived connected devices exposing unexpected telemetry risks, and why identity systems remain the primary entry point for attackers.

    続きを読む 一部表示
    28 分
  • Autonomous AI, Broken Guardrails, and Geopolitics
    2026/03/15

    In this Initial Access podcast episode, we cover autonomous vulnerability discovery, AI agents that ignore instructions, and why models are becoming strategic national assets.

    続きを読む 一部表示
    20 分
  • SSO Phishing, Patching Failures, Exposed APIs
    2026/03/15

    In this Initial Access podcast episode, we cover SSO phishing, patching failures, exposed APIs, and zombie infrastructure remind us that basic security hygiene still decides the outcome.

    続きを読む 一部表示
    22 分
  • Prompt Injection, Session Hijacking & Why AI Isn't Writing the Attack Plans Yet
    2026/03/15

    In this Initial Access podcast episode, we cover AI prompt injection risks, continued social engineering via LinkedIn and QR codes, credential theft and session hijacking, patch reliability and appliance security, and how AI is being used to accelerate malware development, distinguishing meaningful risk from overhyped claims.

    続きを読む 一部表示
    20 分