← All Tags

#cybersecurity

36 episodes

#2226: When Quantum Breaks Everything

Quantum computers will shatter RSA and elliptic-curve encryption—but the real danger is data being stolen and stored right now, waiting to be decry...

post-quantum-cryptographycryptographycybersecurity

#2104: VPN Metadata Leaks and How to Close Them

A VPN isn't magic. Learn how DNS and SNI leaks expose your browsing, and what encrypted DNS and ECH actually do to fix it.

privacycybersecuritynetwork-security

#2103: AI Firewalls: Spotting Bombs on an Encrypted Conveyor Belt

With 95% of web traffic encrypted, firewalls can't read packets. Here's how AI analyzes metadata to detect threats without decryption.

cybersecurityai-agentsiot-protocols

#2102: Why Don't You Notice AI Security Delays?

Multi-layer security checks add latency, but modern CLIs hide it under 100ms using parallelization and speculation.

ai-agentslatencycybersecurity

#2098: The Invisible War for the Radio Spectrum

Modern wars are won by controlling invisible waves, not just physical ground. Discover how electronic and cyber warfare merge to rewrite reality.

electronic-warfarecybersecuritymilitary-strategy

#2078: SITREP Flash; 7 Apr 02:50 (23:50 UTC)

U.S. sets a midnight deadline for Iran to leave the Strait of Hormuz as B-21 bombers and carriers move into position.

iranmilitary-strategycybersecurity

#2059: npm Cache and Stale Dependencies in Agentic Pipelines

npx is silently running old versions of your AI tools. Here's why your updates vanish into a cache black hole.

ai-agentscybersecuritysoftware-development

#1908: Cloudflare Bot Controls: Getting the Balance Right

AI bots are crawling the web like a bank heist. Are Cloudflare's new controls protecting your content, or just helping Google?

cybersecurityai-agentsnetwork-security

#1905: How VCs Verify AI Startups Without Stealing Code

From the "No-NDA Paradox" to AWS bill forensics, here’s how investors separate real AI from Raspberry Pis in fancy cases.

ai-agentsai-securitycybersecurity

#1887: The Lone Wolf Is a Myth

The Las Vegas 2025 incident wasn't a lone wolf—it was the terrifying new face of digital radicalization.

social-engineeringcybersecurityosint

#1872: DMARC: The Bouncer for Your Email

SMTP is broken. DMARC is the fix. Learn why your emails might vanish after April 2026 and how to stop domain spoofing.

cybersecuritynetwork-securitydmarc

#1824: Why Governments Are Building Bunkers for AI

Public clouds can’t handle the security or scale of classified AI. Governments are retreating to fortified bunkers.

national-securitycybersecuritydata-security

#1813: Why Jerusalem Is Israel's New Deep-Tech Capital

Jerusalem's tech sector grew 40% in 2024-25, outpacing Tel Aviv. Discover why this ancient city is now Israel's hub for AI, biotech, and cybersecur...

israelai-agentscybersecurity

#1785: The FBI's Dual Identity: Cop and Spy

The FBI is unique among global intelligence agencies, blending high-stakes spy work with federal law enforcement in a single hybrid model.

national-securityespionagecybersecurity

#1722: The Dark Web Is Smaller Than You Think

Forget the iceberg myth—the dark web is more like a tiny shed behind a skyscraper, with only 3 million users and 100k sites.

privacycybersecuritytor

#1720: The Ultimate Power Tool for Hackers

Metasploit isn't just a tool; it's the industrial standard for digital break-ins. Here's how it works.

cybersecurityopen-sourcesoftware-development

#1719: Why PII Detection Still Fails at Scale

Regex alone is brittle; NER is expensive. See how hybrid frameworks like Presidio balance speed and accuracy to stop data leaks.

privacycybersecurityosint

#1706: Hollywood Hacking vs. Real Airgap Sabotage

Why the "lone operative" trope breaks down when you look at the physical reality of nuclear facility security.

cybersecurityelectronic-warfarehuman-intelligence

#1549: Why Your Next GitHub Notification Could Be a Trap

Attackers are weaponizing GitHub notifications to bypass security filters. Learn how to spot the latest phishing lures before you click.

social-engineeringsupply-chain-securitycybersecurity

#1503: The Death of the Annual Audit: Real-Time SOC 2 Compliance

Move beyond the "once-a-year fire drill." Discover how AI agents and continuous monitoring are redefining SOC 2 compliance in 2026.

cybersecurityai-agents2026

#1318: The Analog Hole: Why Your Screen is a Security Leak

Your firewall can’t stop a smartphone camera. Discover why the "analog hole" is the ultimate blind spot in modern enterprise security.

cybersecurityremote-workai-watermarking

#1317: The First Second: Why Your PC Still Needs a BIOS

Explore the high-stakes drama of the BIOS, the "Root of Trust" that teaches your computer how to be a computer every time you hit the power button.

architecturehardware-engineeringcybersecurity

#1280: Laptop Farms: North Korea’s Invisible Hardware Backdoor

Discover how North Korean operatives use "laptop farms" and IP-KVM hardware to bypass security and infiltrate the US workforce.

cybersecurityespionagesupply-chain-security

#1230: Hackers Lived in Your Account for 200 Days Before You Knew

By the time you get a breach notification, the damage is already done. Discover the hidden reality of the "silent breach" and API security.

cybersecuritydata-security2026

#1229: Beyond the .env File: Mastering Secrets Management

Stop relying on "security by pinky-promise." Learn how to move from messy .env files to professional zero-trust secrets management.

software-developmentcybersecuritydata-security

#1165: Unit 8200: The $160B Secret Behind the Startup Nation

Explore how an elite Israeli intelligence unit became a $160B startup engine and the ethical friction behind its global tech dominance.

signals-intelligenceisraeli-economycybersecurity

#1090: EMP Warfare: From Nuclear Blasts to Surgical Strikes

Explore the science of EMPs, from continent-sized nuclear pulses to surgical microwave strikes that can disable a building without a single shot.

electronic-warfaremissile-defensecybersecurity

#994: Is Your Phone Keeping You Safe or Keeping You Trapped?

Stop letting Google gaslight you. Learn how to safely install apps outside the Play Store while keeping your data secure from poisoned packages.

securitycybersecuritydigital-privacyandroidsideloading

#968: Breaking the Air Gap: The Truth About Industrial Cyber War

Beyond the "hacker in a hoodie" myth, we explore how state actors breach air-gapped systems to sabotage critical physical infrastructure.

industrial-automationcybersecuritynational-securitylegacy-systemssupply-chain-security

#928: Can the Middle East Prosper Without a Palestinian Peace?

Is the Arab world replacing Europe as Israel's top trade partner? We dive into the shifting geopolitics of the Abraham Accords in 2026.

geopoliticscybersecurityregional-defense

#724: The Surreal Evolution of Proving You’re Human

Why are CAPTCHAs asking us to identify cats with lightbulbs? Discover the invisible arms race between AI and digital gatekeeping.

cybersecurityprivacydigital-identity

#582: Can We Hide Anything From a 30cm Satellite Lens?

Herman and Corn explore the "grey zone" of space, from high-res spy satellites to the terrifying reality of orbital "death hugs."

satellite-imageryelectronic-warfarecybersecurity

#537: The Architecture of Secrecy: From State Secrets to Zero Trust

Is there a master list of state secrets? Explore the evolution of government classification and its impact on modern digital security.

national-securitycybersecuritymilitary-strategydata-securityzero-trust

#168: Digital Vaults: The Mainstream Rise of Air-Gapped AI

Discover why air-gapping is going mainstream in 2026 and how organizations are securing local AI models using "digital vaults."

air-gappingai-securitycybersecuritydigital-vaultslocal-llms

#140: Shadow Webs: The Secret Military Internet Explained

Herman and Corn explore the "shadow internet," revealing how military networks use air gaps, dark fiber, and data diodes to stay secure.

shadow-internetmilitary-networkssiprnetdark-fibercybersecurity

#49: AI Cyberattacks Are Doubling Every 6 Months—Here's Why

AI cyberattacks are doubling every 6 months. Discover why AI is a force multiplier for threat actors and what organizations can do.

ai-cyberattackscybersecuritythreat-actorsanthropicai-espionage