SquareX is excited to launch The Be Fearless Podcast Series, where we bring together industry experts and professionals from the cybersecurity community. Hosted by SquareX Founder - and cybersecurity veteran - Vivek Ramachandran, look forward to insights about our guests’ journeys in security, the evolution of the field, the changing threatscape and how enterprises across industries are addressing them today.
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
A weekly podcast for bounty hunters, exploit developers or anyone interesting in the details of the latest disclosed vulnerabilities and exploits.
…
continue reading
I'm Chris (REal0day) Magistrado, hacker who interviews hackers, entrepreneurs, community builders, and investors. https://HackersToFounders.com
…
continue reading

1
Breaking Barriers as a Woman in Cybersecurity | Chenxi Wang, Founder, Rain Capital
57:51
57:51
Play later
Play later
Lists
Like
Liked
57:51Dr. Chenxi Wang, Founder and General Partner of Rain Capital, has fascinating patterns in cybersecurity investing that most people miss. In this conversation, we dive deep into the mismatch between what founders are building versus what CISOs actually need, female representation amongst cyber founders and why being fearless isn't just a podcast nam…
…
continue reading

1
The Human Element Still Matters in a Quantum AI World
50:26
50:26
Play later
Play later
Lists
Like
Liked
50:26Send us a text Aksa Taylor shares her journey from electrical engineering to cybersecurity, highlighting how curiosity and focused passion can open unexpected career doors in the security industry. • Finding specific interests within cybersecurity rather than trying to "get into security" broadly • Building a personal brand through knowledge sharin…
…
continue reading

1
From Reactive to Predictive Threat Intelligence | Christopher Ahlberg, CEO, Recorded Future
1:05:49
1:05:49
Play later
Play later
Lists
Like
Liked
1:05:49Christopher Ahlberg, CEO and co-founder of Recorded Future (which was recently acquired by Mastercard), breaks down the evolving cybersecurity landscape with SquareX's field CISO John Carse. From his journey building Spotfire to creating the world's largest threat intelligence company, Ahlberg shares critical insights on nation-state actors today, …
…
continue reading

1
How Scepticism Saves Companies | Luke Shoberg, Latacora, ex-Global CISO of Sequoia
57:32
57:32
Play later
Play later
Lists
Like
Liked
57:32Luke Shoberg took an unconventional path from studying biology to becoming Global CISO at Sequoia Capital. In this conversation, Luke explains what makes VC security uniquely challenging, why being "professionally paranoid" is essential in security, and how startups can implement scale-appropriate security without killing innovation. 0:00 Introduct…
…
continue reading

1
“True Leadership Lies in Humility” | Vijay Jajoo, Partner, Cyber, Data, and Tech Enablement, KPMG US
50:33
50:33
Play later
Play later
Lists
Like
Liked
50:33In this episode, we sit down with Vijay Jajoo, a partner at KPMG with over two decades of experience in cyber data and tech containment. Vijay shares his unique journey into cybersecurity, the biggest challenges facing large organisations today, and the best leadership advice he ever received. 0:00 The Flyer that Led to a Cybersecurity Career 11:20…
…
continue reading

1
Ric Prado: CIA Black Ops Operator That Hunted Bin Laden
1:12:57
1:12:57
Play later
Play later
Lists
Like
Liked
1:12:57Send us a text Ric Prado shares his remarkable journey from Cuban refugee to CIA Senior Operations Officer, revealing how being separated from his parents at age 8 during Castro's revolution eventually led him to America where he found purpose in military service and intelligence work. • Escaped Cuba at age 8 through Operation Peter Pan, sent alone…
…
continue reading

1
The Browser Has Become The New Perimeter | Cecil Su, Director of Cybersecurity and CTI, BDO Advisory
1:08:24
1:08:24
Play later
Play later
Lists
Like
Liked
1:08:24Cecil Su, Director of Cybersecurity and CTI at BDO Advisory and co-lead of OWASP Singapore Chapter, brings nearly two decades of experience from his start in hospitality systems to becoming the cybersecurity leader he is today. In this episode, Cecil breaks down why the browser has become the new perimeter, insights on Singapore's vibrant cybersecu…
…
continue reading

1
Being a Purpose-Driven CIO | Andrea Bergamini, VP & CIO, Orbia
52:44
52:44
Play later
Play later
Lists
Like
Liked
52:44Andrea Bergamini, VP and CIO of Orbia, started as a telco engineer 20 years ago when cybersecurity barely existed, but went into the field due to his audit work at GE, which sparked his fascination with risk and controls. Fast forward to today, and he's not just the VP and CISO at Orbia—a $8 billion purpose-driven company—but he recently made the l…
…
continue reading

1
Inside the Mind of a CIA Agent: Nuclear Threats and Intelligence Operations
54:20
54:20
Play later
Play later
Lists
Like
Liked
54:20Send us a text Digital Disruption with Geoff Nielson Discover how technology is reshaping our lives and livelihoods. Listen on: Apple Podcasts Spotify Support the show Follow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/s…
…
continue reading

1
Building Great Cybersecurity Teams | Aamir Niazi, Executive Director/CISO, SMBC Capital Markets
34:42
34:42
Play later
Play later
Lists
Like
Liked
34:42Aamir Niazi, Executive Director and CISO at SMBC Capital Markets, shares his unfiltered 18-year journey from engineer to leading cybersecurity teams in financial services. Aamir gets honest about hiring mistakes, building remote teams during COVID, browser security challenges, getting executive buy-in, and the challenges of transitioning from hands…
…
continue reading

1
Doing Adversary Emulation Right | William Booth, General Manager, Director MITRE ATT&CK Evaluations
1:11:31
1:11:31
Play later
Play later
Lists
Like
Liked
1:11:31What if most organizations are testing their security tools against the wrong threats entirely? As the leader behind the industry standard program that helps organizations understand how security tools perform against real-world threats, William Booth, General Manager and Director of MITRE's ATT&CK Evaluations, shares common misconceptions in adver…
…
continue reading

1
Building Companies to be Legendary | Aleksandr Yampolskiy, Co-Founder/CEO of SecurityScorecard
43:55
43:55
Play later
Play later
Lists
Like
Liked
43:55Dr. Aleksandr Yampolskiy, cofounder and CEO of SecurityScorecard, went from being a 14-year old immigrant to America to building SecurityScorecard — the security ratings platform now used by over 3,000 companies. In this conversation with SquareX founder Vivek Ramachandran, Aleksandr breaks down the real challenges of category creation, his playboo…
…
continue reading

1
Can Your Messaging Survive the Quantum Computing Threat?
52:04
52:04
Play later
Play later
Lists
Like
Liked
52:04Send us a text Anurag Lal discusses the critical importance of quantum-resistant encryption for enterprise messaging and the urgent need for organizations to prepare for the coming quantum computing revolution that will render current encryption methods obsolete. • Anurag's extensive background in technology from Apple to Sprint and participation i…
…
continue reading

1
Municipal Cybersecurity and Defending Infrastructure | Dr. Brian Gardner, CISO, City of Austin
55:21
55:21
Play later
Play later
Lists
Like
Liked
55:21Meet Dr. Brian Gardner, who secured the City of Dallas for over 7 years before moving to Austin as the City’s CISO. In this episode of the Be Fearless Podcast, Brian shares war stories from managing critical infrastructure, how he grew Dallas's cybersecurity budget from 2.3% to nearly 10% of the IT spend, and dives into the unique challenges cities…
…
continue reading

1
Building Relationships Transforms Security | Jimmy Benoit, CISO of PBS
34:10
34:10
Play later
Play later
Lists
Like
Liked
34:10What does it take to protect a beloved cultural institution like PBS? In this episode, Jimmy Benoit, CISO of PBS, discusses how he transitioned from military service to cybersecurity, balancing security requirements with business objectives, and why building relationships across the organization matters more than any single technology solution. 0:0…
…
continue reading

1
You Can't Fix All Security Gaps — So Focus on Core Fundamentals | Mandy Andress, CISO at Elastic
47:53
47:53
Play later
Play later
Lists
Like
Liked
47:53Mandy Andress brings over two decades of cybersecurity leadership experience to this conversation, including her current role as CISO at Elastic and her 13-year tenure at MassMutual where she led a $50 million strategic security investment initiative. In this episode, Mandy shares candid insights about prioritizing security gaps by focusing on core…
…
continue reading

1
The SHOCKING Truth About AI Security in Hospitals
45:33
45:33
Play later
Play later
Lists
Like
Liked
45:33Send us a text Security is increasingly viewed as a strategic business advantage rather than just a necessary cost center. The dialogue explores how companies are leveraging their security posture to gain competitive advantages in sales cycles and build customer trust. • Taylor's journey from aspiring physical therapist to cybersecurity expert thro…
…
continue reading

1
The Mechanics of Security Investing | Zain Rizavi, CEO at Stealth, ex-VC
54:35
54:35
Play later
Play later
Lists
Like
Liked
54:35Cybersecurity Co-Founder and ex-Venture Capitalist Zain Rizavi breaks down what really happens behind closed doors in cybersecurity investing. From his unconventional journey from political science to backing the next generation of security companies, Zain reveals why most founders get product-market fit completely wrong and what it really takes to…
…
continue reading

1
Metasploit's Origin, Browser Bugs & Exposure Management | HD Moore, Founder of runZero & Metasploit
49:47
49:47
Play later
Play later
Lists
Like
Liked
49:47If you’re in the cybersecurity field, HD Moore, runZero founder and creator of Metasploit, needs no introduction — his work has fundamentally changed how the security industry thinks about vulnerabilities. In this candid conversation, HD shares the story behind building the world's most widely used penetration testing framework, war stories from th…
…
continue reading

1
The 3 Buckets Framework: How This CISO Thinks About Security | Sangram Dash, CISO, VP of IT, Sisense
1:00:39
1:00:39
Play later
Play later
Lists
Like
Liked
1:00:39Sangram Dash has spent over two decades in cybersecurity, from witnessing the massive eBay breach response to leading security at companies like PayPal and Square. In this episode, he breaks down his practical "3 buckets" framework that every security team should follow, shares lessons from previous incidents and why the human element of incident r…
…
continue reading

1
Reputation is Everything: How AI and Domain Security Shape Today's Threat Landscape
55:13
55:13
Play later
Play later
Lists
Like
Liked
55:13Send us a text Ihab Shraim shares his expertise on domain security and why it represents the "missing chapter" in modern cybersecurity strategy. We explore how AI is accelerating cyber threats from years to weeks and why protecting your online presence is more critical than ever. • Domain security is often overlooked despite being critical to an or…
…
continue reading
Send us a text Digital Disruption with Geoff Nielson Discover how technology is reshaping our lives and livelihoods. Listen on: Apple Podcasts Spotify Root.io Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you. Support the show Follow the Podcast on Social Media! Tesla Referral…
…
continue reading

1
“Security’s a People Problem” | Jayesh Singh Chauhan, Founder Cloud Village and Cloudurance Security
1:26:16
1:26:16
Play later
Play later
Lists
Like
Liked
1:26:16In this episode, SquareX Field CISO John Carse sits down with Jayesh, founder of Cloud Village and CEO of Cloudurance Security, to explore the growing threat of browser-based attacks in cloud environments. Jayesh shares practical insights on product security, the importance of "enrollment conversations" with stakeholders, and why browsers have beco…
…
continue reading

1
Security Goes Mainstream: Hackers, Headlines & What's Next | Sid Trivedi & Ross Haleliuk
1:04:30
1:04:30
Play later
Play later
Lists
Like
Liked
1:04:30Join us as we welcome Sid Trivedi (Partner at Foundation Capital) and Ross Haleliuk (Founder of a Stealth Security Startup and Author of Cyber for Builders), co-hosts of the "Inside the Network" podcast! In this conversation, they share investor and operator perspectives on cybersecurity trends and its evolution from technical obscurity to mainstre…
…
continue reading

1
Exploiting VS Code with Control Characters
30:08
30:08
Play later
Play later
Lists
Like
Liked
30:08A quick episode this week, which includes attacking VS Code with ASCII control characters, as well as a referrer leak and SCIM hunting. Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/282.html [00:00:00] Introduction [00:00:57] Attacking Hypervisors - Training Update [00:06:20] Drag and Pwnd: Leve…
…
continue reading

1
DEF CON's Next Chapter and New Browser Security Frontiers | Jeff Moss, Founder of DEF CON/Black Hat
1:22:14
1:22:14
Play later
Play later
Lists
Like
Liked
1:22:14Jeff Moss, founder of the famed DEF CON and Black Hat conferences, joins Vivek Ramachandran for another episode of the Be Fearless Podcast. Jeff reveals how DEF CON’s new one-roof strategy at the Las Vegas Convention Center has transformed the conference experience, while preserving its unique hacker culture that has endured for decades. He explain…
…
continue reading

1
When Past Security Doesn't Predict Future Threats | Yu Long (Tyler) Tang, Director, softScheck APAC
54:08
54:08
Play later
Play later
Lists
Like
Liked
54:08In this episode of the Be Fearless Podcast, Yu Long (Tyler) Tang, Director of Enterprise Information Security Strategy at softScheck APAC, joins us to share his journey from martial arts to cybersecurity and how the protection mindset carried over. A highly qualified speaker and Secretary and Certified Mentor with the ISC2 Singapore Chapter, Yu Lon…
…
continue reading

1
Browser Security Unveiled: John Carse on SquareX & Cyber Career Insights
48:22
48:22
Play later
Play later
Lists
Like
Liked
48:22Send us a text In this episode, Joe sits down with John Carse, Field CISO at SquareX, to dive into the often-overlooked world of browser security and the evolving landscape of cybersecurity. Recorded despite a 12-hour time difference (Singapore to the US!), John shares: The Browser Security Gap: Why 85% of user time in browsers is a growing risk fo…
…
continue reading

1
Inside the Attacker Mindset with Abhijith B R, Founder of Adversary Village and BreachSimRange
1:12:46
1:12:46
Play later
Play later
Lists
Like
Liked
1:12:46Ever wondered how professional hackers think? SquareX Field CISO John Carse sits down with Abhijith B R, Founder/Head of security consulting at BreachSimRange, and Adversary Village at DEF CON, who also has a wealth of ethical hacking experience. In this episode, Abhijith pulls back the curtain on the hacker mindset, shares his war stories from pre…
…
continue reading

1
Mastering Cyber Risk: Matthew Alderman on Cybersecurity, Leadership & Building CyberSaint
44:54
44:54
Play later
Play later
Lists
Like
Liked
44:54Send us a text Join Joe as he reconnects with Matthew Alderman, Chief Product Officer at CyberSaint, in this insightful episode of the podcast! With over 250 episodes under his belt, Joe dives deep with Matthew, a cybersecurity veteran, podcast host, and advisor, to explore: CyberSaint’s Game-Changing Approach: How CyberSaint uses historical loss d…
…
continue reading

1
Mitigating Browser Hacking - Interview with John Carse (SquareX Field CISO)
1:46:57
1:46:57
Play later
Play later
Lists
Like
Liked
1:46:57A special episode this week, featuring an interview with John Carse, Chief Information Security Officer (CISO) of SquareX. John speaks about his background in the security industry, grants insight into attacks on browsers, and talks about the work his team at SquareX is doing to detect and mitigate browser-based attacks.…
…
continue reading

1
Pulling Gemini Secrets and Windows HVPT
1:33:22
1:33:22
Play later
Play later
Lists
Like
Liked
1:33:22A long episode this week, featuring an attack that can leak secrets from Gemini's Python sandbox, banks abusing private iOS APIs, and Windows new Hypervisor-enforced Paging Translation (HVPT). Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/280.html [00:00:00] Introduction [00:00:18] Doing the Due…
…
continue reading

1
Understanding Adversaries via Threat-Informed Defense | Mike Cunningham, MITRE R&D Program Manager
47:42
47:42
Play later
Play later
Lists
Like
Liked
47:42In this episode, SquareX field CISO John Carse speaks with Mike Cunningham, R&D Program Manager at MITRE's Center for Threat-Informed Defense. Mike brings his unique background from the Navy and NSA to discuss how organizations can better defend against cyber threats by understanding adversary behaviors, browser security challenges and more. If you…
…
continue reading

1
From Bank to Blockchain: The Evolution of Web3 Security | Evelyn Lam, CISO of Trust Wallet
36:12
36:12
Play later
Play later
Lists
Like
Liked
36:12In this International Women's Day special episode, Evelyn Lam, CISO of Trust Wallet, shares her journey from traditional banking at Morgan Stanley to the cutting edge of Web3 security. She breaks down the fundamental differences between Web2 and Web3, explaining why security is even more critical in a decentralized environment where users control t…
…
continue reading

1
The Business-First CISO: Leading Security Beyond Tech | Pasi Koistinen, CISO, Coinhako
50:02
50:02
Play later
Play later
Lists
Like
Liked
50:02Ever wondered what it really takes to lead security at a crypto company? In this episode, we sit down with Pasi Koistinen, CISO at Coinhako, who's spent more than two decades in the cybersecurity trenches. Pasi gets real about why being technically brilliant isn't enough anymore - you've got to speak the language of business to succeed as a CISO. H…
…
continue reading

1
Session-ception and User Namespaces Strike Again
49:36
49:36
Play later
Play later
Lists
Like
Liked
49:36API hacking and bypassing Ubuntu's user namespace restrictions feature in this week's episode, as well as a bug in CimFS for Windows and revisiting the infamous NSO group WebP bug. Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/279.html [00:00:00] Introduction [00:00:28] Next.js and the corrupt m…
…
continue reading

1
From Special Forces to Cybersecurity: Ricoh Danielson’s Journey to CISO and Digital Forensics
48:49
48:49
Play later
Play later
Lists
Like
Liked
48:49Send us a text In this episode, host Joe sits down with Ricoh Danielson, a former Special Forces operator turned cybersecurity expert and CISO. Ricoh shares his incredible journey—from nine combat rotations overseas to law school, and eventually a career pivot into IT and digital forensics. Discover how military discipline, resilience, and adaptabi…
…
continue reading

1
Cybersecurity for both Enterprises & Families | Elcin Biren, Founder/CEO, SwissCyberSmart
36:49
36:49
Play later
Play later
Lists
Like
Liked
36:49This special International Women's Day episode features Elcin Biren, security leader, Founder and CEO of SwissCyberSmart. With nearly two decades of cybersecurity experience spanning roles from ethical hacker to CISO, Elcin shares her journey and mission to protect families online. Elcin discusses her groundbreaking work with the world's first cybe…
…
continue reading

1
From Tech Geek to C-Suite: Secrets to Winning Over Executives
36:08
36:08
Play later
Play later
Lists
Like
Liked
36:08Send us a text Joe and Peter Ramadan dive deep into the art of communicating with executives—no fluff, just real talk. Discover how to ditch the jargon, nail concise briefings, and win trust at the top, whether you’re a security pro, tech lead, or aspiring CISO. Peter unveils his new e-learning series on executive briefings, sharing hard-earned les…
…
continue reading

1
AI Security Secrets Unveiled: NSA Tech, Zero Trust & 2025 Cyber Trends With Jason Rogers from Invary
45:15
45:15
Play later
Play later
Lists
Like
Liked
45:15Send us a text Struggling to secure AI in 2025? Join Joe and Invary CEO Jason Rogers as they unpack NSA-licensed tech, zero trust frameworks, and the future of cybersecurity. From satellite security to battling advanced threats, discover how Invary’s cutting-edge solutions are reshaping the industry. Plus, hear Jason’s startup journey and Joe’s wil…
…
continue reading

1
Extracting YouTube Creator Emails and Spilling Azure Secrets
44:04
44:04
Play later
Play later
Lists
Like
Liked
44:04This episode features some game exploitation in Neverwinter Nights, weaknesses in mobile implementation for PassKeys, and a bug that allows disclosure of the email addresses of YouTube creators. We also cover some research on weaknesses in Azure. Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/278…
…
continue reading

1
Ep. 18 - Eliminating Human Errors w/ Patrick Thomas
1:13:26
1:13:26
Play later
Play later
Lists
Like
Liked
1:13:26What if AI-powered security could eliminate human errors in cybersecurity? Meet the founder making it happen. In this episode of Hackers to Founders, I sit down with Patrick Ben Thomas, the founder of NullZec and its advanced malware development division, Shadow Mask. Patrick shares his journey from early cybersecurity research to building a soluti…
…
continue reading

1
Building a Million-Dollar Cybersecurity Career | Darren Argyle, Group CISRO, Standard Chartered
44:02
44:02
Play later
Play later
Lists
Like
Liked
44:02Ever wondered what it takes to reach the top tier of cybersecurity leadership? In this candid conversation, Darren Argyle shares his remarkable path from being a bar manager in the UK to becoming a recognized global CISO and cybersecurity educator. You’ll learn Darren’s 5 principles for reaching a $1M cybersecurity salary, why browser security has …
…
continue reading

1
ESP32 Backdoor Drama and SAML Auth Bypasses
1:14:08
1:14:08
Play later
Play later
Lists
Like
Liked
1:14:08Discussion this week starts with the ESP32 "backdoor" drama that circled the media, with some XML-based vulnerabilities in the mix. Finally, we cap off with a post on reviving modprobe_path for Linux exploitation, and some discussion around an attack chain against China that was attributed to the NSA. Links and vulnerability summaries for this epis…
…
continue reading

1
Security Data Strategy: Lessons from the Equifax Breach with Justin Borland and Aqsa Taylor
54:12
54:12
Play later
Play later
Lists
Like
Liked
54:12Send us a text In this episode, we dive into the critical world of security data strategy with experts Aqsa Taylor and Justin Borland, authors of the upcoming book Applied Security Data Strategy: A Leader’s Guide. Justin, a veteran of the Equifax breach, shares firsthand lessons from one of the biggest security incidents in history, while Aqsa expl…
…
continue reading

1
Exploiting Xbox 360 Hypervisor and Microcode Hacking
1:19:05
1:19:05
Play later
Play later
Lists
Like
Liked
1:19:05A very technical episode this week, featuring some posts on hacking the xbox 360 hypervisor as well as AMD microcode hacking. Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/276.html [00:00:00] Introduction [00:00:15] Reversing Samsung's H-Arx Hypervisor Framework - Part 1 [00:10:34] Hacking the X…
…
continue reading

1
From Teenage Gamer to SaaS Security Guru: The Untold Journey of a Cybersecurity Pro Aaron Costello
51:13
51:13
Play later
Play later
Lists
Like
Liked
51:13Send us a text Summary In this conversation, Joe and Aaron discuss Aaron's journey into cybersecurity, highlighting the importance of curiosity, perseverance, and continuous learning in the field. Aaron shares his early experiences with hacking, his transition into professional security roles, and the unique challenges of pen testing SaaS applicati…
…
continue reading

1
Path Confusion and Mixing Public/Private Keys
59:34
59:34
Play later
Play later
Lists
Like
Liked
59:34This week's episode features a variety of vulnerabilities, including a warning on mixing up public and private keys in OpenID Connect deployments, as well as path confusion with an nginx+apache setup. Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/275.html [00:00:00] Introduction [00:19:00] The O…
…
continue reading

1
Designer to Defender: Why Diversity Makes Security Stronger | Jane Frankland MBE, Security Leader
46:10
46:10
Play later
Play later
Lists
Like
Liked
46:10“You don't have to wait for permission. You don't have to wait for someone to see you, recognize you or whatever. I firmly believe that the world is your oyster.” Join us for an insightful and inspiring conversation with Jane Frankland MBE, a globally recognized cybersecurity leader and author of "INSecurity." In this episode of the Be Fearless Pod…
…
continue reading

1
ZDI's Triaging Troubles and LibreOffice Exploits
57:02
57:02
Play later
Play later
Lists
Like
Liked
57:02We discuss an 0day that was dropped on Parallels after 7 months of no fix from the vendor, as well as ZDI's troubles with responses to researchers and reproducing bugs. Also included are a bunch of filesystem issues, and an insanely technical linux kernel exploit chain. Links and vulnerability summaries for this episode are available at: https://da…
…
continue reading