logo
episode-header-image
Aug 2024
1h 30m

Episode 85: Practical Applications of DE...

Justin Gardner (Rhynorater) & Joseph Thacker (Rez0)
About this episode
tail spinning
Up next
Mar 12
Episode 165: Protobuf Hacking, AI-Powered Bug Hunting, and Self-Improving Claude Workflows
Episode 165: In this episode of Critical Thinking - Bug Bounty Podcast Justin recaps his Zero Trust World experience, before we dive into Permissions issues client-side bugs, New Hardware Hacking Classes, and using AI to hack.Follow us on twitter at: https://x.com/ctbbpodcastGot ... Show More
44m 23s
Mar 5
Episode 164: Tommy DeVoss: From Black Hat to Bug Bounty LEGEND
Episode 164: In this episode of Critical Thinking - Bug Bounty Podcast Justin sits down with Tommy DeVoss to talk about his origin story, Yahoo bugs, and how Tommy first got Justin into Bug BountyFollow us on twitter at: https://x.com/ctbbpodcastGot any ideas and suggestions? Fee ... Show More
1h 11m
Feb 26
Episode 163: Best Technical Takeaways from Portswigger Top 10 2025
Episode 163: In this episode of Critical Thinking - Bug Bounty Podcast It’s that time of year again! We’re looking at the Portswigger Research list of top 10 web hacking techniques of 2025.Follow us on twitter at: https://x.com/ctbbpodcastGot any ideas and suggestions? Feel free ... Show More
1h 8m
Recommended Episodes
Oct 2025
Pt.2 Beyond Phishing: Cyber Threats in the Age of AI with Four Flynn
In part two, Hannah and Four tackle the human element at the heart of cybersecurity: Who are the bad actors, and what motivates them? They dissect the evolving strategies designed to stop social engineering attacks - like passkeys and risk-based authentication - and confront the ... Show More
25m 32s
Jun 2024
Unlocking the Secrets of AI in Tech with April Yoho
<p>Join hosts Charles William Carpenter III and Adam Argyle for a riveting episode of 'Whiskey Web and Whatnot' featuring guest April Yoho. </p> <p> Based in the UK and a seasoned developer advocate, April shares her extensive 25+ years of experience in tech while indulging in a ... Show More
40m 45s
Feb 2025
SN 1014: FREEDOM Administration Login - Apple's UK Privacy Showdown, $1.5 Billion Crypto Heist
Apple disables Advanced Data Protection for new UK users. Paying ransoms is not as cut and dried as we might imagine. Elon Musk's "X" social media blocks "Signal.me" links. Spain's soccer league blocks Cloudflare and causes a mess. Two new (and rare) vulnerabilities discovered in ... Show More
2h 39m
Sep 2025
Critical GoAnywhere bug exposed.
Fortra flags a critical flaw in its GoAnywhere Managed File Transfer (MFT) solution. Cisco patches a critical vulnerability in its IOS and IOS XE software. Cloudflare thwarts yet another record DDoS attack. Rhysida ransomware gang claims the Maryland Transit cyberattack. The new ... Show More
29m 13s
Sep 2025
455: The Chicken Killer | The Official Podcast
Get 25% off HelixSleep sitewide: go to https://www.helixsleep.com/official Get 25% off your Fitbod subscription or try the app for free: go to https://www.fitbod.me/official Get additional episodes and bonus content with early access (try now with 7 DAYS FREE): go to https://www. ... Show More
1h 41m
Aug 2022
Talos Takes Ep. #72: Emergency Apache HTTP Server episode
<div>Sorry for dropping two episodes in the feed in one day, but we also needed to find time to talk about the critical zero-day vulnerability in Apache HTTP Server. An attacker could exploit this vulnerability to perform path traversal and eventually remote code execution. Patch ... Show More
5m 5s
Mar 2016
Episode 214: 214: Atrophic Cohost
<p>Sean, Kyle, and a chorus of small frogs discuss the Game Developers Conference, eating alone, atrophic organs, Slack vs Basecamp, the cost of abstractions, and tips for adding new team members.</p> <p><a href="http://braintreepayments.com/railspodcast">Braintree</a>: An easy w ... Show More
1h 23m
Sep 2025
All Things BGP: Discovering BGP Zombies & More
Dive into the world of Border Gateway Protocol (BGP)—the backbone of the Internet—and explore everything from BGP zombies to BGP monitoring best practices. Tune in for this special conversation with Lefteris Manassakis and The Internet Report team. A seasoned researcher and netwo ... Show More
34m 27s
Feb 2025
Pay the ransom or risk data carnage.
Qilin ransomware gang claims responsibility for attack against Lee Enterprises. Thai police arrest suspected hacker behind more than 90 data leaks. JavaGhost uses compromised AWS environments to launch phishing campaigns. LotusBlossum cyberespionage campaigns target Southeast Asi ... Show More
25m 19s