Home
Categories
EXPLORE
True Crime
Comedy
Business
Sports
Society & Culture
History
Fiction
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/79/14/33/791433c7-52da-f3b6-a453-bbf992946ecd/mza_10604889840378575100.jpg/600x600bb.jpg
You Deserve to be Hacked
CovertSwarm
40 episodes
1 month ago
Artificial intelligence is rapidly becoming an active partner in offensive cybersecurity. In this episode, Jim Clover, founder of Varadius Ltd and former UK Government cyber operations lead, joins Luke Potter, COO at CovertSwarm, to explore how AI is changing the way real attacks are planned and executed. Jim brings a grounded perspective shaped by years of experience and a deep understanding of AI model safety. Luke provides insight from the front line of offensive operations, where AI...
Show more...
Technology
Business,
News,
Tech News
RSS
All content for You Deserve to be Hacked is the property of CovertSwarm and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Artificial intelligence is rapidly becoming an active partner in offensive cybersecurity. In this episode, Jim Clover, founder of Varadius Ltd and former UK Government cyber operations lead, joins Luke Potter, COO at CovertSwarm, to explore how AI is changing the way real attacks are planned and executed. Jim brings a grounded perspective shaped by years of experience and a deep understanding of AI model safety. Luke provides insight from the front line of offensive operations, where AI...
Show more...
Technology
Business,
News,
Tech News
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/79/14/33/791433c7-52da-f3b6-a453-bbf992946ecd/mza_10604889840378575100.jpg/600x600bb.jpg
S2 E1: Inside the Spider - Anatomy of an attack
You Deserve to be Hacked
42 minutes
6 months ago
S2 E1: Inside the Spider - Anatomy of an attack
Social engineering. SIM swapping. MFA fatigue. These aren’t just headlines from last year. They’re live tactics, straight from the Scattered Spider playbook. In this episode, we join CovertSwarm’s own operators as we explore the methods used by threat groups like Scattered Spider. From helpdesk manipulation to full identity compromise, we break down the tactics, the weak points, and how attackers really move inside your org. -- Successful companies are constant targets for attackers. ...
You Deserve to be Hacked
Artificial intelligence is rapidly becoming an active partner in offensive cybersecurity. In this episode, Jim Clover, founder of Varadius Ltd and former UK Government cyber operations lead, joins Luke Potter, COO at CovertSwarm, to explore how AI is changing the way real attacks are planned and executed. Jim brings a grounded perspective shaped by years of experience and a deep understanding of AI model safety. Luke provides insight from the front line of offensive operations, where AI...