{"version":"https://jsonfeed.org/version/1","title":"Scinary Information Nexus","home_page_url":"https://scinary-info-nexus.fireside.fm","feed_url":"https://scinary-info-nexus.fireside.fm/json","description":"Scinary Cybersecurity is here to \"Serve and defend those who serve and defend others\". To help us \"serve and defend\" we pull from many different sources - experts, colleagues, industry standards, etc... We hit every subject from all angles making it easy to understand while also letting us go in depth. Making this podcast perfect for cybersecurity beginners and experts alike. Come join us on our journey to constantly educate ourselves and explore the amazing things that are happening in our industry. ","_fireside":{"subtitle":"Cybersecurity discussions, news, and expert interviews","pubdate":"2025-10-31T07:00:00.000-05:00","explicit":false,"copyright":"2025 by Scinary Cybersecurity","owner":"Scinary Cybersecurity","image":"https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/38ec063a-aaf5-42e5-975a-6ef30bb34326/cover.jpg?v=9"},"items":[{"id":"26772a76-5d6b-44e5-b273-dae68d493ac7","title":"Episode 28: Nightmare on AWS Street: Halloween Special","url":"https://scinary-info-nexus.fireside.fm/28","content_text":"Welcome back to a very spooky Scinary Information Nexus! Richard, Joseph, Tye, and Hunter are in full costume for this Halloween special to discuss a truly terrifying event: the day the internet broke.\n\nThis week, the team tackles the massive AWS outage that took down services from Microsoft to your smart home devices. We break down the technical jargon to explain the \"race condition\" that caused a critical DNS failure and explore the cascade effect that left companies scrambling. Why were multi-billion dollar firms operating without a failover plan? We also share some of the hilarious real-world consequences, like smart beds trapping their owners in a heated, upright position.\n\nThen, we revisit the massive Salesforce data breach with a frightening new update: the threat group \"Scattered Lapsus$ Hunters\" has leaked data belonging to personnel from the Department of Defense, DHS, ICE, and other critical US government agencies. This leads to a larger discussion on the fragility of our digital world.\n\nIn this episode, we discuss:\n\n\nThe technical cause of the AWS outage: What is a DNS \"race condition\"?\nWhy competitors like Microsoft were also taken offline.\nThe critical debate: Are we prioritizing efficiency over resiliency?\nHilarious IoT failures: When your smart bed turns against you.\nUpdate on the Salesforce Breach: US Government data now exposed.\nThe danger of monopolies: How AWS, Google, and AT\u0026amp;T create single points of failure.\nThe importance of having an analog (pen and paper) backup plan.\n\n\nIs our critical infrastructure built on a house of cards? Let's discuss.\n\n\n\nConnect with Scinary Cybersecurity:\nhttps://www.scinary.com\nhttps://x.com/scinarycyber\nhttps://www.linkedin.com/company/scinarycyber/","content_html":"\u003cp\u003eWelcome back to a very spooky Scinary Information Nexus! Richard, Joseph, Tye, and Hunter are in full costume for this Halloween special to discuss a truly terrifying event: the day the internet broke.\u003c/p\u003e\n\n\u003cp\u003eThis week, the team tackles the massive AWS outage that took down services from Microsoft to your smart home devices. We break down the technical jargon to explain the \u0026quot;race condition\u0026quot; that caused a critical DNS failure and explore the cascade effect that left companies scrambling. Why were multi-billion dollar firms operating without a failover plan? We also share some of the hilarious real-world consequences, like smart beds trapping their owners in a heated, upright position.\u003c/p\u003e\n\n\u003cp\u003eThen, we revisit the massive Salesforce data breach with a frightening new update: the threat group \u0026quot;Scattered Lapsus$ Hunters\u0026quot; has leaked data belonging to personnel from the Department of Defense, DHS, ICE, and other critical US government agencies. This leads to a larger discussion on the fragility of our digital world.\u003c/p\u003e\n\n\u003cp\u003eIn this episode, we discuss:\u003c/p\u003e\n\n\u003cul\u003e\n\u003cli\u003eThe technical cause of the AWS outage: What is a DNS \u0026quot;race condition\u0026quot;?\u003c/li\u003e\n\u003cli\u003eWhy competitors like Microsoft were also taken offline.\u003c/li\u003e\n\u003cli\u003eThe critical debate: Are we prioritizing efficiency over resiliency?\u003c/li\u003e\n\u003cli\u003eHilarious IoT failures: When your smart bed turns against you.\u003c/li\u003e\n\u003cli\u003eUpdate on the Salesforce Breach: US Government data now exposed.\u003c/li\u003e\n\u003cli\u003eThe danger of monopolies: How AWS, Google, and AT\u0026amp;T create single points of failure.\u003c/li\u003e\n\u003cli\u003eThe importance of having an analog (pen and paper) backup plan.\u003c/li\u003e\n\u003c/ul\u003e\n\n\u003cp\u003eIs our critical infrastructure built on a house of cards? Let\u0026#39;s discuss.\u003c/p\u003e\n\n\u003chr\u003e\n\n\u003cp\u003eConnect with Scinary Cybersecurity:\u003cbr\u003e\n\u003ca href=\"https://www.scinary.com\" rel=\"nofollow\"\u003ehttps://www.scinary.com\u003c/a\u003e\u003cbr\u003e\n\u003ca href=\"https://x.com/scinarycyber\" rel=\"nofollow\"\u003ehttps://x.com/scinarycyber\u003c/a\u003e\u003cbr\u003e\u003cbr\u003e\n\u003ca href=\"https://www.linkedin.com/company/scinarycyber/\" rel=\"nofollow\"\u003ehttps://www.linkedin.com/company/scinarycyber/\u003c/a\u003e\u003c/p\u003e","summary":"In this Halloween special, the team discusses the massive AWS outage that recently brought large swaths of the internet to a halt. They break down the technical \"race condition\" that caused the DNS failure, explore the comical real-world consequences like smart beds getting stuck, and analyze why even competitors like Microsoft were affected. The conversation broadens into a critical look at the tech industry's single points of failure (AWS, AT\u0026T), the dangerous trade-off between efficiency and resiliency, and whether our critical infrastructure is too reliant on a few monopolies. Additionally, they provide an update on the Salesforce breach, revealing that data belonging to personnel in major US government departments (DOD, DHS, ICE) was compromised by the threat group \"Scattered Lapsus$ Hunters\"","date_published":"2025-10-31T07:00:00.000-05:00","attachments":[{"url":"https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/26772a76-5d6b-44e5-b273-dae68d493ac7.mp3","mime_type":"audio/mpeg","size_in_bytes":78433397,"duration_in_seconds":3239}]},{"id":"a39423d4-38ac-4ff2-b1fd-5efd97b2fde3","title":"Episode 27: The New Rules of War: Cyber \u0026 Disinformation","url":"https://scinary-info-nexus.fireside.fm/27","content_text":"This week on the Scinary Information Nexus, we are honored to welcome a very special guest: Lieutenant Colonel Steven Beseda, United States Army (Retired). With a deep background in both armored forces and Information Operations, Colonel Beseda joins Richard, Brazos, and John to pull back the curtain on the modern battlefield.\n\nForget everything you think you know about traditional warfare. We break down the crucial difference between misinformation and disinformation, exploring how state actors like Russia use it to shape narratives at home and abroad. Using fascinating historical examples-from General Schwarzkopf's classic deception operation in Desert Storm to the unprecedented OSINT (Open-Source Intelligence) coming out of the Ukraine war-we reveal how information has become a primary weapon.\n\nThe conversation then focuses on one of the world's most critical flashpoints: Taiwan. How is China using information warfare to prep the battlespace and undermine Taiwanese and U.S. resolve? And how does the global reliance on Taiwan's semiconductor industry play into this new era of conflict?\n\nIn this episode, we discuss:\n\n\nMisinformation vs. Disinformation: A military definition you need to know.\nDeception Operations: How the U.S. military fooled Saddam Hussein.\nThe Russia-Ukraine War as a live-fire information warfare laboratory.\nThe strategic use of OSINT and platforms like Telegram in modern conflicts.\nChina's doctrine to win without fighting by targeting Taiwan's cognitive space.\nThe shift from Nuclear MAD to a new \"Cyber MAD\" (Mutually Assured Destruction).\nThe vulnerability of U.S. critical infrastructure to Chinese technology.\nSoft Power \u0026amp; Economic Warfare: China's \"Belt and Road\" initiative.\n\n\nIs the next world war one that will be fought not with soldiers and tanks, but with keyboards and data streams? Let's get into it.\n\n\n\nConnect with Scinary Cybersecurity:\nhttps://www.scinary.com\nhttps://x.com/scinarycyber\nhttps://www.linkedin.com/company/scinarycyber/\n\nCyberWarfare #Disinformation #InformationWarfare #MilitaryStrategy #China #Taiwan #USArmy #Cybersecurity #OSINT #Geopolitics","content_html":"\u003cp\u003eThis week on the Scinary Information Nexus, we are honored to welcome a very special guest: Lieutenant Colonel Steven Beseda, United States Army (Retired). With a deep background in both armored forces and Information Operations, Colonel Beseda joins Richard, Brazos, and John to pull back the curtain on the modern battlefield.\u003c/p\u003e\n\n\u003cp\u003eForget everything you think you know about traditional warfare. We break down the crucial difference between misinformation and disinformation, exploring how state actors like Russia use it to shape narratives at home and abroad. Using fascinating historical examples-from General Schwarzkopf\u0026#39;s classic deception operation in Desert Storm to the unprecedented OSINT (Open-Source Intelligence) coming out of the Ukraine war-we reveal how information has become a primary weapon.\u003c/p\u003e\n\n\u003cp\u003eThe conversation then focuses on one of the world\u0026#39;s most critical flashpoints: Taiwan. How is China using information warfare to prep the battlespace and undermine Taiwanese and U.S. resolve? And how does the global reliance on Taiwan\u0026#39;s semiconductor industry play into this new era of conflict?\u003c/p\u003e\n\n\u003cp\u003eIn this episode, we discuss:\u003c/p\u003e\n\n\u003cul\u003e\n\u003cli\u003eMisinformation vs. Disinformation: A military definition you need to know.\u003c/li\u003e\n\u003cli\u003eDeception Operations: How the U.S. military fooled Saddam Hussein.\u003c/li\u003e\n\u003cli\u003eThe Russia-Ukraine War as a live-fire information warfare laboratory.\u003c/li\u003e\n\u003cli\u003eThe strategic use of OSINT and platforms like Telegram in modern conflicts.\u003c/li\u003e\n\u003cli\u003eChina\u0026#39;s doctrine to win without fighting by targeting Taiwan\u0026#39;s cognitive space.\u003c/li\u003e\n\u003cli\u003eThe shift from Nuclear MAD to a new \u0026quot;Cyber MAD\u0026quot; (Mutually Assured Destruction).\u003c/li\u003e\n\u003cli\u003eThe vulnerability of U.S. critical infrastructure to Chinese technology.\u003c/li\u003e\n\u003cli\u003eSoft Power \u0026amp; Economic Warfare: China\u0026#39;s \u0026quot;Belt and Road\u0026quot; initiative.\u003c/li\u003e\n\u003c/ul\u003e\n\n\u003cp\u003eIs the next world war one that will be fought not with soldiers and tanks, but with keyboards and data streams? Let\u0026#39;s get into it.\u003c/p\u003e\n\n\u003chr\u003e\n\n\u003cp\u003eConnect with Scinary Cybersecurity:\u003cbr\u003e\n\u003ca href=\"https://www.scinary.com\" rel=\"nofollow\"\u003ehttps://www.scinary.com\u003c/a\u003e\u003cbr\u003e\n\u003ca href=\"https://x.com/scinarycyber\" rel=\"nofollow\"\u003ehttps://x.com/scinarycyber\u003c/a\u003e\u003cbr\u003e\u003cbr\u003e\n\u003ca href=\"https://www.linkedin.com/company/scinarycyber/\" rel=\"nofollow\"\u003ehttps://www.linkedin.com/company/scinarycyber/\u003c/a\u003e\u003c/p\u003e\n\n\u003ch1\u003eCyberWarfare #Disinformation #InformationWarfare #MilitaryStrategy #China #Taiwan #USArmy #Cybersecurity #OSINT #Geopolitics\u003c/h1\u003e","summary":"The team is joined by special guest Lieutenant Colonel Steven Beseda, a retired U.S. Army Armor and Information Operations officer, for a deep dive into modern warfare. The discussion clarifies the critical differences between misinformation (unintentional falsehoods) and disinformation (deliberate deception), using historical examples from Schwarzkopf’s \"left hook\" in Desert Storm to Russia's ongoing campaign in Ukraine. The conversation pivots to the escalating tensions between China and Taiwan, analyzing how China is \"prepping the battlespace\" with information warfare and the strategic importance of Taiwan's semiconductor industry. Finally, they explore the chilling concept of a new \"Cyber MAD\" (Mutually Assured Destruction), questioning whether the next global conflict will be fought with bombs or with bytes targeting critical infrastructure.","date_published":"2025-10-24T07:00:00.000-05:00","attachments":[{"url":"https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/a39423d4-38ac-4ff2-b1fd-5efd97b2fde3.mp3","mime_type":"audio/mpeg","size_in_bytes":91150321,"duration_in_seconds":3755}]},{"id":"edb09f0c-7c44-482a-b036-85d8048b7d65","title":"Episode 26: A Tech Director's Perspective on School Cyber Threats","url":"https://scinary-info-nexus.fireside.fm/26","content_text":"Welcome back to the Scinary Information Nexus! This week, we're joined by a special guest from the educational front lines, Greg Babbitt, the Technology Director at Palmer ISD, for a packed episode you can't afford to miss.\n\nFirst, we tackle one of the biggest stories of the year: the Salesforce breach. Richard, Brazos, and Joseph break down how the \"Scattered Lapsus Hunters\" allegedly compromised giants like Disney, Home Depot, and Google through sophisticated OAuth and API attacks. We discuss the billion-dollar ransom, the responsibility of SaaS providers, and what this means for every company that entrusts their data to a third party.\n\nThen, with Greg's expertise, we dive deep into the unique cybersecurity landscape of K-12 education. We explore why the biggest threat is often the human element inside the network and discuss the immense challenges of vetting and securing countless third-party apps and services-from bus routing software to Google Workspace. It's a candid look at the real-world tightrope walk between security, usability, and budget that every school district faces.\n\nIn this episode, we discuss:\n\n\nThe Salesforce Breach: How OAuth tokens and API keys led to a potential catastrophe.\nThe \"Scattered Lapsis Hunters\" and their tactics.\nWhy companies like Disney can't just blame their vendors.\nThe C-Suite conversation: Communicating reputational risk to non-technical leadership.\nThe \"Human Element\": Why training isn't enough to stop phishing.\nThird-Party Risk in K-12: What happens when you have no leverage over your vendors?\nThe \"Free\" Trap: Uncovering the hidden security costs of Google Workspace for Education.\nThe importance of a \"no-blame\" culture when security incidents happen.\n\n\nIs your organization truly prepared for the risks buried in your supply chain and your own hallways? Let's get into it.\n\n\n\nConnect with Scinary Cybersecurity:\nhttps://www.scinary.com\nhttps://x.com/scinarycyber\nhttps://www.linkedin.com/company/scinarycyber/\n\nCybersecurity #Salesforce #DataBreach #K12 #EdTech #InfoSec #ThirdPartyRisk #CybersecurityPodcast #Education #Phishing","content_html":"\u003cp\u003eWelcome back to the Scinary Information Nexus! This week, we\u0026#39;re joined by a special guest from the educational front lines, Greg Babbitt, the Technology Director at Palmer ISD, for a packed episode you can\u0026#39;t afford to miss.\u003c/p\u003e\n\n\u003cp\u003eFirst, we tackle one of the biggest stories of the year: the Salesforce breach. Richard, Brazos, and Joseph break down how the \u0026quot;Scattered Lapsus Hunters\u0026quot; allegedly compromised giants like Disney, Home Depot, and Google through sophisticated OAuth and API attacks. We discuss the billion-dollar ransom, the responsibility of SaaS providers, and what this means for every company that entrusts their data to a third party.\u003c/p\u003e\n\n\u003cp\u003eThen, with Greg\u0026#39;s expertise, we dive deep into the unique cybersecurity landscape of K-12 education. We explore why the biggest threat is often the human element inside the network and discuss the immense challenges of vetting and securing countless third-party apps and services-from bus routing software to Google Workspace. It\u0026#39;s a candid look at the real-world tightrope walk between security, usability, and budget that every school district faces.\u003c/p\u003e\n\n\u003cp\u003eIn this episode, we discuss:\u003c/p\u003e\n\n\u003cul\u003e\n\u003cli\u003eThe Salesforce Breach: How OAuth tokens and API keys led to a potential catastrophe.\u003c/li\u003e\n\u003cli\u003eThe \u0026quot;Scattered Lapsis Hunters\u0026quot; and their tactics.\u003c/li\u003e\n\u003cli\u003eWhy companies like Disney can\u0026#39;t just blame their vendors.\u003c/li\u003e\n\u003cli\u003eThe C-Suite conversation: Communicating reputational risk to non-technical leadership.\u003c/li\u003e\n\u003cli\u003eThe \u0026quot;Human Element\u0026quot;: Why training isn\u0026#39;t enough to stop phishing.\u003c/li\u003e\n\u003cli\u003eThird-Party Risk in K-12: What happens when you have no leverage over your vendors?\u003c/li\u003e\n\u003cli\u003eThe \u0026quot;Free\u0026quot; Trap: Uncovering the hidden security costs of Google Workspace for Education.\u003c/li\u003e\n\u003cli\u003eThe importance of a \u0026quot;no-blame\u0026quot; culture when security incidents happen.\u003c/li\u003e\n\u003c/ul\u003e\n\n\u003cp\u003eIs your organization truly prepared for the risks buried in your supply chain and your own hallways? Let\u0026#39;s get into it.\u003c/p\u003e\n\n\u003chr\u003e\n\n\u003cp\u003eConnect with Scinary Cybersecurity:\u003cbr\u003e\n\u003ca href=\"https://www.scinary.com\" rel=\"nofollow\"\u003ehttps://www.scinary.com\u003c/a\u003e\u003cbr\u003e\n\u003ca href=\"https://x.com/scinarycyber\" rel=\"nofollow\"\u003ehttps://x.com/scinarycyber\u003c/a\u003e\u003cbr\u003e\n\u003ca href=\"https://www.linkedin.com/company/scinarycyber/\" rel=\"nofollow\"\u003ehttps://www.linkedin.com/company/scinarycyber/\u003c/a\u003e\u003c/p\u003e\n\n\u003ch1\u003eCybersecurity #Salesforce #DataBreach #K12 #EdTech #InfoSec #ThirdPartyRisk #CybersecurityPodcast #Education #Phishing\u003c/h1\u003e","summary":"The Scinary team, along with special guest Greg Babbitt, Technology Director at Palmer ISD, tackles a massive week in cybersecurity news. They dissect the colossal Salesforce breach allegedly carried out by the \"Scattered Lapsis Hunters,\" breaking down the OAuth attack vector, the $1 billion ransom, and the major companies affected like Disney and Home Depot. The discussion then pivots to the unique and often overlooked cybersecurity challenges within K-12 education. Greg provides a frontline perspective on the constant battle against the \"human element,\" the difficulties of managing third-party vendor risk with limited leverage, and the hidden costs and security gaps in \"free\" educational tools like Google Workspace.","date_published":"2025-10-17T07:00:00.000-05:00","attachments":[{"url":"https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/edb09f0c-7c44-482a-b036-85d8048b7d65.mp3","mime_type":"audio/mpeg","size_in_bytes":114351480,"duration_in_seconds":4717}]},{"id":"2b967cf0-72b9-4186-a08c-6fbce0c25d6a","title":"Episode 25: Your TV is Watching You: ATSC 3 / NextGen Broadcast","url":"https://scinary-info-nexus.fireside.fm/25","content_text":"Welcome back to the Scinary Information Nexus! This week, we have a very special guest: Daniel Hamilton, a 38-year veteran of the broadcast industry, drone program administrator, and Joseph's dad!\n\nRichard, Mario, and Joseph sit down with Daniel to discuss the massive technological changes happening just behind your TV screen. We're talking about ATSC 3.0, or \"NextGen TV,\" the new broadcast standard poised to turn free over-the-air television into a data-driven powerhouse. Learn how your viewing habits could soon be correlated with your online searches to deliver hyper-targeted ads, and what this IP-based system means for your privacy and cybersecurity. Could a hijacked broadcast signal one day be used to push malware directly to your smart TV?\n\nThen, the conversation takes to the skies as we tackle the U.S. government's impending ban on Chinese-made drones. As an administrator for a fleet of nearly 500 drones, Daniel gives us a frontline report on the chaos this policy is causing. We break down why this move feels like political theater, cripples industries from journalism to agriculture, and ignores the bigger national security picture of where our technology REALLY comes from.\n\nIn this episode, we discuss:\n\n\nWhat is ATSC 3.0 and how will it change \"free\" TV forever?\nThe end of anonymity: How broadcasters will track what you watch.\nGeo-targeting alerts: Ending \"alert fatigue\" during severe weather.\nThe new cybersecurity risks of IP-connected broadcasting.\nThe government's ban on Chinese drones (DJI) and its real-world impact.\nWhy American-made drone alternatives aren't ready to fill the gap.\nThe hypocrisy: Banning consumer drones while critical infrastructure runs on Chinese chips.\nWill your next drone cost you $25,000?\n\n\nIs a \"smarter\" TV worth giving up another layer of your personal data? Let's discuss.\n\n\n\nConnect with Scinary Cybersecurity:\nhttps://www.scinary.com\nhttps://x.com/scinarycyber\nhttps://www.linkedin.com/company/scinarycyber/\n\nNextGenTV #ATSC3 #Cybersecurity #Privacy #DroneBan #DJI #Broadcast #InfoSec #CybersecurityPodcast #NationalSecurity","content_html":"\u003cp\u003eWelcome back to the Scinary Information Nexus! This week, we have a very special guest: Daniel Hamilton, a 38-year veteran of the broadcast industry, drone program administrator, and Joseph\u0026#39;s dad!\u003c/p\u003e\n\n\u003cp\u003eRichard, Mario, and Joseph sit down with Daniel to discuss the massive technological changes happening just behind your TV screen. We\u0026#39;re talking about ATSC 3.0, or \u0026quot;NextGen TV,\u0026quot; the new broadcast standard poised to turn free over-the-air television into a data-driven powerhouse. Learn how your viewing habits could soon be correlated with your online searches to deliver hyper-targeted ads, and what this IP-based system means for your privacy and cybersecurity. Could a hijacked broadcast signal one day be used to push malware directly to your smart TV?\u003c/p\u003e\n\n\u003cp\u003eThen, the conversation takes to the skies as we tackle the U.S. government\u0026#39;s impending ban on Chinese-made drones. As an administrator for a fleet of nearly 500 drones, Daniel gives us a frontline report on the chaos this policy is causing. We break down why this move feels like political theater, cripples industries from journalism to agriculture, and ignores the bigger national security picture of where our technology REALLY comes from.\u003c/p\u003e\n\n\u003cp\u003eIn this episode, we discuss:\u003c/p\u003e\n\n\u003cul\u003e\n\u003cli\u003eWhat is ATSC 3.0 and how will it change \u0026quot;free\u0026quot; TV forever?\u003c/li\u003e\n\u003cli\u003eThe end of anonymity: How broadcasters will track what you watch.\u003c/li\u003e\n\u003cli\u003eGeo-targeting alerts: Ending \u0026quot;alert fatigue\u0026quot; during severe weather.\u003c/li\u003e\n\u003cli\u003eThe new cybersecurity risks of IP-connected broadcasting.\u003c/li\u003e\n\u003cli\u003eThe government\u0026#39;s ban on Chinese drones (DJI) and its real-world impact.\u003c/li\u003e\n\u003cli\u003eWhy American-made drone alternatives aren\u0026#39;t ready to fill the gap.\u003c/li\u003e\n\u003cli\u003eThe hypocrisy: Banning consumer drones while critical infrastructure runs on Chinese chips.\u003c/li\u003e\n\u003cli\u003eWill your next drone cost you $25,000?\u003c/li\u003e\n\u003c/ul\u003e\n\n\u003cp\u003eIs a \u0026quot;smarter\u0026quot; TV worth giving up another layer of your personal data? Let\u0026#39;s discuss.\u003c/p\u003e\n\n\u003chr\u003e\n\n\u003cp\u003eConnect with Scinary Cybersecurity:\u003cbr\u003e\n\u003ca href=\"https://www.scinary.com\" rel=\"nofollow\"\u003ehttps://www.scinary.com\u003c/a\u003e\u003cbr\u003e\n\u003ca href=\"https://x.com/scinarycyber\" rel=\"nofollow\"\u003ehttps://x.com/scinarycyber\u003c/a\u003e\u003cbr\u003e\u003cbr\u003e\n\u003ca href=\"https://www.linkedin.com/company/scinarycyber/\" rel=\"nofollow\"\u003ehttps://www.linkedin.com/company/scinarycyber/\u003c/a\u003e\u003c/p\u003e\n\n\u003ch1\u003eNextGenTV #ATSC3 #Cybersecurity #Privacy #DroneBan #DJI #Broadcast #InfoSec #CybersecurityPodcast #NationalSecurity\u003c/h1\u003e","summary":"This week, the team is joined by broadcast television veteran Daniel Hamilton to explore two major technological shifts with significant cybersecurity and privacy implications. First, they dive into ATSC 3.0 (NextGen TV), the new standard that will transform free over-the-air television into an interactive, IP-based platform. The discussion unpacks how this technology will enable hyper-targeted advertising by collecting and correlating viewer data—much like Google and Meta do—and raises questions about the new security vulnerabilities and privacy trade-offs for consumers.\r\n\r\nThe conversation then pivots to the impending government ban on Chinese-made drones (like those from DJI). Daniel, who administers a national drone program, details the operational and financial chaos this legislation is causing. The team critically examines the policy, labeling it \"political theater\" that targets consumer tech while ignoring the widespread use of Chinese components in America's critical infrastructure, and highlights the lack of viable, cost-effective American alternatives.","date_published":"2025-10-10T07:00:00.000-05:00","attachments":[{"url":"https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/2b967cf0-72b9-4186-a08c-6fbce0c25d6a.mp3","mime_type":"audio/mpeg","size_in_bytes":86237758,"duration_in_seconds":3561}]},{"id":"68f622e1-d9cd-4ed5-99dd-a7cbdbb43843","title":"Episode 24: Phishing 3.0: AI Threats Beyond Email (ft. Ironscales CEO)","url":"https://scinary-info-nexus.fireside.fm/24","content_text":"This week on the Scinary Information Nexus, we're joined by a special guest, Eyal Benishti, the CEO of our email security partner, Ironscales!\n\nRichard, Brazos, Joseph, and John sit down with Eyal to discuss the massive shifts in the threat landscape, from the early days of obvious malware attachments (Phishing 1.0) to the sophisticated social engineering attacks that plague businesses today (Phishing 2.0).\n\nBut the real focus is on the future: What is \"Phishing 3.0\"? Eyal breaks down how generative AI, deepfake voice and video, and prompt injection attacks are creating a new reality where phishing is no longer confined to email. We explore how attackers are using tools like Teams, Slack, and other communication channels to create persistent, multi-modal attacks that are virtually indistinguishable from legitimate requests. How do we fight back when we can't trust what we see and hear? The answer lies in adaptive, agentic AI.\n\nIn this episode, we discuss:\n\n\nThe origin story of Ironscales and why a new approach to email security was needed.\nPhishing 1.0 vs 2.0 vs 3.0: The evolution of the attack.\nWhy traditional Secure Email Gateways (SEGs) miss modern threats.\nDeepfakes \u0026amp; Voice Cloning: The weaponization of generative AI.\nAgentic AI: How to fight fire with fire.\nThe future of security: Protecting communication, not just email inboxes.\nWhy the \"human in the loop\" is still critical for training AI models.\nHow your employees can become your strongest defense layer.\n\n\nAs AI makes attacks more convincing than ever, how do we rebuild trust in our digital communications? Let's discuss.\n\n\n\nConnect with our guest, Eyal Benishti, and Ironscales:\nhttps://www.ironscales.com/\nhttps://www.linkedin.com/in/eyalbd1\n\nConnect with Scinary Cybersecurity:\nhttps://www.scinary.com\nhttps://x.com/scinarycyber\nhttps://www.linkedin.com/company/scinarycyber/\n\nphishing #cybersecurity #AI #infosec #socialengineering #podcast #sysadmin","content_html":"\u003cp\u003eThis week on the Scinary Information Nexus, we\u0026#39;re joined by a special guest, Eyal Benishti, the CEO of our email security partner, Ironscales!\u003c/p\u003e\n\n\u003cp\u003eRichard, Brazos, Joseph, and John sit down with Eyal to discuss the massive shifts in the threat landscape, from the early days of obvious malware attachments (Phishing 1.0) to the sophisticated social engineering attacks that plague businesses today (Phishing 2.0).\u003c/p\u003e\n\n\u003cp\u003eBut the real focus is on the future: What is \u0026quot;Phishing 3.0\u0026quot;? Eyal breaks down how generative AI, deepfake voice and video, and prompt injection attacks are creating a new reality where phishing is no longer confined to email. We explore how attackers are using tools like Teams, Slack, and other communication channels to create persistent, multi-modal attacks that are virtually indistinguishable from legitimate requests. How do we fight back when we can\u0026#39;t trust what we see and hear? The answer lies in adaptive, agentic AI.\u003c/p\u003e\n\n\u003cp\u003eIn this episode, we discuss:\u003c/p\u003e\n\n\u003cul\u003e\n\u003cli\u003eThe origin story of Ironscales and why a new approach to email security was needed.\u003c/li\u003e\n\u003cli\u003ePhishing 1.0 vs 2.0 vs 3.0: The evolution of the attack.\u003c/li\u003e\n\u003cli\u003eWhy traditional Secure Email Gateways (SEGs) miss modern threats.\u003c/li\u003e\n\u003cli\u003eDeepfakes \u0026amp; Voice Cloning: The weaponization of generative AI.\u003c/li\u003e\n\u003cli\u003eAgentic AI: How to fight fire with fire.\u003c/li\u003e\n\u003cli\u003eThe future of security: Protecting communication, not just email inboxes.\u003c/li\u003e\n\u003cli\u003eWhy the \u0026quot;human in the loop\u0026quot; is still critical for training AI models.\u003c/li\u003e\n\u003cli\u003eHow your employees can become your strongest defense layer.\u003c/li\u003e\n\u003c/ul\u003e\n\n\u003cp\u003eAs AI makes attacks more convincing than ever, how do we rebuild trust in our digital communications? Let\u0026#39;s discuss.\u003c/p\u003e\n\n\u003chr\u003e\n\n\u003cp\u003eConnect with our guest, Eyal Benishti, and Ironscales:\u003cbr\u003e\n\u003ca href=\"https://www.ironscales.com/\" rel=\"nofollow\"\u003ehttps://www.ironscales.com/\u003c/a\u003e\u003cbr\u003e\n\u003ca href=\"https://www.linkedin.com/in/eyalbd1\" rel=\"nofollow\"\u003ehttps://www.linkedin.com/in/eyalbd1\u003c/a\u003e\u003c/p\u003e\n\n\u003cp\u003eConnect with Scinary Cybersecurity:\u003cbr\u003e\n\u003ca href=\"https://www.scinary.com\" rel=\"nofollow\"\u003ehttps://www.scinary.com\u003c/a\u003e\u003cbr\u003e\n\u003ca href=\"https://x.com/scinarycyber\" rel=\"nofollow\"\u003ehttps://x.com/scinarycyber\u003c/a\u003e\u003cbr\u003e\u003cbr\u003e\n\u003ca href=\"https://www.linkedin.com/company/scinarycyber/\" rel=\"nofollow\"\u003ehttps://www.linkedin.com/company/scinarycyber/\u003c/a\u003e\u003c/p\u003e\n\n\u003ch1\u003ephishing #cybersecurity #AI #infosec #socialengineering #podcast #sysadmin\u003c/h1\u003e","summary":"The team sits down with Eyal Benishti, the CEO of our partner Ironscales, for a deep dive into the evolution of email security. Eyal shares the origin story of Ironscales and explains why traditional Secure Email Gateways (SEGs) are no longer sufficient to stop modern, sophisticated \"Phishing 2.0\" attacks like Business Email Compromise. The core of the discussion explores the emerging frontier of \"Phishing 3.0,\" a new threat landscape driven by generative AI, deepfakes, and multi-channel attacks that weaponize platforms like Teams and Slack. Eyal explains how the defense must shift towards adaptive, agentic AI to protect all forms of communication and rebuild trust in a world where you can't always believe what you see or hear.","date_published":"2025-10-03T07:00:00.000-05:00","attachments":[{"url":"https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/68f622e1-d9cd-4ed5-99dd-a7cbdbb43843.mp3","mime_type":"audio/mpeg","size_in_bytes":124135353,"duration_in_seconds":3843}]},{"id":"ccbff439-1f9a-4128-97df-38d07f8849d6","title":"Episode 23: Debunking VPN Myths: Are You Really Anonymous Online?","url":"https://scinary-info-nexus.fireside.fm/23","content_text":"Welcome back to the Scinary Information Nexus! After a technical mishap involving an unplugged cable (we're looking at you, Mario), the team is back to tackle a topic that affects almost every internet user: online privacy.\n\nThis week, Brazos, Tye, and Mario dive deep into the privacy policies of the VPNs you see advertised everywhere—from NordVPN to Surfshark. They uncover the fine print that contradicts the \"no-log\" promises and reveal how everything from your DNS requests to your credit card payment can instantly de-anonymize you. We also discuss what makes a VPN provider like Mullvad trustworthy in a sea of questionable marketing.\n\nThen, we turn our sights to PII (Personally Identifiable Information) removal services like Incogni and DeleteMe. Are they the silver bullet for data brokers, or are you paying a premium for a service with a less than 50% success rate? The research might shock you.\n\nIn this episode, we discuss:\n\n\nThe \"No-Log\" Myth: What your VPN provider isn't telling you.\nHow paying for a VPN by credit card can compromise your identity.\nThe surprising ownership structure behind NordVPN and Surfshark.\nShocking research: The 48% success rate and 41% accuracy rate of PII removal services.\nA trustworthy alternative: What makes services like Mullvad different?\nData Brokers 101: How they get your information and why it's so hard to remove.\nWhy you need to ask yourself what you're really using a VPN for.\n\n\nIs your online privacy just a product being sold back to you? Let's discuss.\n\n\n\nConnect with Scinary Cybersecurity:\nhttps://www.scinary.com\nhttps://x.com/scinarycyber\nhttps://www.linkedin.com/company/scinarycyber/\n\nVPN #Cybersecurity #Privacy #NordVPN #Surfshark #DataBroker #OnlineSafety #InfoSec #CybersecurityPodcast #Mullvad","content_html":"\u003cp\u003eWelcome back to the Scinary Information Nexus! After a technical mishap involving an unplugged cable (we\u0026#39;re looking at you, Mario), the team is back to tackle a topic that affects almost every internet user: online privacy.\u003c/p\u003e\n\n\u003cp\u003eThis week, Brazos, Tye, and Mario dive deep into the privacy policies of the VPNs you see advertised everywhere—from NordVPN to Surfshark. They uncover the fine print that contradicts the \u0026quot;no-log\u0026quot; promises and reveal how everything from your DNS requests to your credit card payment can instantly de-anonymize you. We also discuss what makes a VPN provider like Mullvad trustworthy in a sea of questionable marketing.\u003c/p\u003e\n\n\u003cp\u003eThen, we turn our sights to PII (Personally Identifiable Information) removal services like Incogni and DeleteMe. Are they the silver bullet for data brokers, or are you paying a premium for a service with a less than 50% success rate? The research might shock you.\u003c/p\u003e\n\n\u003cp\u003eIn this episode, we discuss:\u003c/p\u003e\n\n\u003cul\u003e\n\u003cli\u003eThe \u0026quot;No-Log\u0026quot; Myth: What your VPN provider isn\u0026#39;t telling you.\u003c/li\u003e\n\u003cli\u003eHow paying for a VPN by credit card can compromise your identity.\u003c/li\u003e\n\u003cli\u003eThe surprising ownership structure behind NordVPN and Surfshark.\u003c/li\u003e\n\u003cli\u003eShocking research: The 48% success rate and 41% accuracy rate of PII removal services.\u003c/li\u003e\n\u003cli\u003eA trustworthy alternative: What makes services like Mullvad different?\u003c/li\u003e\n\u003cli\u003eData Brokers 101: How they get your information and why it\u0026#39;s so hard to remove.\u003c/li\u003e\n\u003cli\u003eWhy you need to ask yourself what you\u0026#39;re \u003cem\u003ereally\u003c/em\u003e using a VPN for.\u003c/li\u003e\n\u003c/ul\u003e\n\n\u003cp\u003eIs your online privacy just a product being sold back to you? Let\u0026#39;s discuss.\u003c/p\u003e\n\n\u003chr\u003e\n\n\u003cp\u003eConnect with Scinary Cybersecurity:\u003cbr\u003e\n\u003ca href=\"https://www.scinary.com\" rel=\"nofollow\"\u003ehttps://www.scinary.com\u003c/a\u003e\u003cbr\u003e\n\u003ca href=\"https://x.com/scinarycyber\" rel=\"nofollow\"\u003ehttps://x.com/scinarycyber\u003c/a\u003e\u003cbr\u003e\u003cbr\u003e\n\u003ca href=\"https://www.linkedin.com/company/scinarycyber/\" rel=\"nofollow\"\u003ehttps://www.linkedin.com/company/scinarycyber/\u003c/a\u003e\u003c/p\u003e\n\n\u003ch1\u003eVPN #Cybersecurity #Privacy #NordVPN #Surfshark #DataBroker #OnlineSafety #InfoSec #CybersecurityPodcast #Mullvad\u003c/h1\u003e","summary":"The team pulls back the curtain on the consumer VPN and data privacy industry. They conduct a deep-dive into the privacy policies of major players like NordVPN and Surfshark, revealing how \"no-log\" claims can be misleading due to DNS logging and financial transaction records. They also present compelling research on PII (Personally Identifiable Information) removal services like Incogni and DeleteMe, exposing their surprisingly low success and accuracy rates, and questioning if these expensive subscriptions are truly worth the cost.","date_published":"2025-09-26T12:00:00.000-05:00","attachments":[{"url":"https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/ccbff439-1f9a-4128-97df-38d07f8849d6.mp3","mime_type":"audio/mpeg","size_in_bytes":113118041,"duration_in_seconds":3515}]},{"id":"3e9e120a-740d-4c4b-bfb6-d80ce1e114ad","title":"Episode 22: The MSP Playbook: Building a Business with Brian Kane","url":"https://scinary-info-nexus.fireside.fm/22","content_text":"Welcome to the Scinary Information Nexus! This week, we have a very special guest in the studio: Brian Kane, the Vice President of Global MSP Channels at Threatdown/Malwarebytes.\n\nJoin us for an insider's look into the trenches of the Managed Service Provider (MSP) world. Brian pulls back the curtain on his 20-year journey, from the scrappy beginnings of building an MSP to advising a global cybersecurity leader. We discuss hilarious war stories about ancient technology, the critical importance of building trust, and why the infamous \"Seagull Method\" of consulting is so destructive. This episode is a masterclass for anyone looking to start their own IT business or for organizations seeking to find a true technology partner.\n\nIn this episode, we discuss:\n\n00:00 - Introducing Brian Kane from Threatdown/Malwarebytes\n02:35 - The Journey of Starting Your Own MSP\n07:03 - Inventing \"SHAPE\": The Precursor to Modern Managed Services\n13:13 - War Story: The $3 Million Machine Running on Windows XP\n16:21 - The \"Seagull Method\" of I.T. Consulting\n29:34 - The Hard Truth About an MSP's First Three Years (MRR)\n31:23 - The \"Dentist Strategy\" for Getting Your First Clients\n39:28 - Where MSPs REALLY Make Money (Hint: It's Efficiency)\n43:03 - When is it Time to FIRE a Client?\n48:33 - The Dangerous Gap Between Client Perception and Reality\n55:43 - \"The Cloud is Just a Computer Somewhere Else\": The Shared Responsibility Model\n\nIf you've ever wondered what it takes to survive and thrive in the I.T. services industry, this is the episode for you. Let's discuss.\n\n\n\nConnect with Scinary Cybersecurity:\nhttps://www.scinary.com\nhttps://x.com/scinarycyber\nhttps://www.linkedin.com/company/scinarycyber/\n\nMSP #ManagedServiceProvider #Cybersecurity #ITBusiness #SmallBusinessIT #Threatdown #Malwarebytes #TechPodcast #CybersecurityPodcast #Entrepreneurship","content_html":"\u003cp\u003eWelcome to the Scinary Information Nexus! This week, we have a very special guest in the studio: Brian Kane, the Vice President of Global MSP Channels at Threatdown/Malwarebytes.\u003c/p\u003e\n\n\u003cp\u003eJoin us for an insider\u0026#39;s look into the trenches of the Managed Service Provider (MSP) world. Brian pulls back the curtain on his 20-year journey, from the scrappy beginnings of building an MSP to advising a global cybersecurity leader. We discuss hilarious war stories about ancient technology, the critical importance of building trust, and why the infamous \u0026quot;Seagull Method\u0026quot; of consulting is so destructive. This episode is a masterclass for anyone looking to start their own IT business or for organizations seeking to find a true technology partner.\u003c/p\u003e\n\n\u003cp\u003eIn this episode, we discuss:\u003c/p\u003e\n\n\u003cp\u003e00:00 - Introducing Brian Kane from Threatdown/Malwarebytes\u003cbr\u003e\n02:35 - The Journey of Starting Your Own MSP\u003cbr\u003e\n07:03 - Inventing \u0026quot;SHAPE\u0026quot;: The Precursor to Modern Managed Services\u003cbr\u003e\n13:13 - War Story: The $3 Million Machine Running on Windows XP\u003cbr\u003e\n16:21 - The \u0026quot;Seagull Method\u0026quot; of I.T. Consulting\u003cbr\u003e\n29:34 - The Hard Truth About an MSP\u0026#39;s First Three Years (MRR)\u003cbr\u003e\n31:23 - The \u0026quot;Dentist Strategy\u0026quot; for Getting Your First Clients\u003cbr\u003e\n39:28 - Where MSPs REALLY Make Money (Hint: It\u0026#39;s Efficiency)\u003cbr\u003e\n43:03 - When is it Time to FIRE a Client?\u003cbr\u003e\n48:33 - The Dangerous Gap Between Client Perception and Reality\u003cbr\u003e\n55:43 - \u0026quot;The Cloud is Just a Computer Somewhere Else\u0026quot;: The Shared Responsibility Model\u003c/p\u003e\n\n\u003cp\u003eIf you\u0026#39;ve ever wondered what it takes to survive and thrive in the I.T. services industry, this is the episode for you. Let\u0026#39;s discuss.\u003c/p\u003e\n\n\u003chr\u003e\n\n\u003cp\u003eConnect with Scinary Cybersecurity:\u003cbr\u003e\n\u003ca href=\"https://www.scinary.com\" rel=\"nofollow\"\u003ehttps://www.scinary.com\u003c/a\u003e\u003cbr\u003e\n\u003ca href=\"https://x.com/scinarycyber\" rel=\"nofollow\"\u003ehttps://x.com/scinarycyber\u003c/a\u003e\u003cbr\u003e\u003cbr\u003e\n\u003ca href=\"https://www.linkedin.com/company/scinarycyber/\" rel=\"nofollow\"\u003ehttps://www.linkedin.com/company/scinarycyber/\u003c/a\u003e\u003c/p\u003e\n\n\u003ch1\u003eMSP #ManagedServiceProvider #Cybersecurity #ITBusiness #SmallBusinessIT #Threatdown #Malwarebytes #TechPodcast #CybersecurityPodcast #Entrepreneurship\u003c/h1\u003e","summary":"This week, we have a very special guest in the studio: Brian Kane, the Vice President of Global MSP Channels at Threatdown/Malwarebytes. Brian pulls back the curtain on his 20-year journey, from the scrappy beginnings of building an MSP to advising a global cybersecurity leader.","date_published":"2025-09-19T07:00:00.000-05:00","attachments":[{"url":"https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/3e9e120a-740d-4c4b-bfb6-d80ce1e114ad.mp3","mime_type":"audio/mpeg","size_in_bytes":97884669,"duration_in_seconds":4047}]},{"id":"2b9a8eda-03f9-4c17-95bc-5edd793cb6b2","title":"Episode 21: Cybersecurity Tools of the Trade: Our Top Picks","url":"https://scinary-info-nexus.fireside.fm/21","content_text":"Welcome back to the Scinary Information Nexus! This week, the team cracks open a few beers and pulls back the curtain on the cybersecurity tools they can't live without. From command-line powerhouses to invaluable web utilities, this is the ultimate list of free and open-source tools for both seasoned professionals and aspiring enthusiasts.\n\nPlus, we break down two major developing stories: the Texas AG's massive lawsuit against PowerSchools over a student data breach and a sophisticated new EDR bypass technique that every defender needs to know about. Stick around to hear why a simple calculator might be one of the most-used tools in our arsenal.\n\nIn this episode, we discuss:\n\n00:00 - Intro, Beer Reviews \u0026amp; Upcoming Conferences\n05:37 - Texas Sues PowerSchools Over Massive Student Data Breach\n14:37 - Can Hackers Bypass Your EDR With Raw Disk Reads?\n20:52 - Our Go-To Cybersecurity Tools\n22:48 - Richard's List: Nmap, DNSDumpster, Shodan \u0026amp; More\n24:18 - Brazos's List: MXToolbox, URLscan.io, and... Calculator\n29:10 - Mario's List: CyberChef, 1Password, Wireshark \u0026amp; VSCode\n41:12 - Joseph's List: KASM, Metasploit \u0026amp; the Power of a Good EDR\n44:18 - Duty Calls... 🪖\n\nFrom foundational utilities to advanced analysis platforms, this episode is packed with recommendations to build out your own toolkit. What are your go-to tools? Let us know in the comments!\n\n\n\nConnect with Scinary Cybersecurity:\nhttps://www.scinary.com\nhttps://x.com/scinarycyber\nhttps://www.linkedin.com/company/scinarycyber/","content_html":"\u003cp\u003eWelcome back to the Scinary Information Nexus! This week, the team cracks open a few beers and pulls back the curtain on the cybersecurity tools they can\u0026#39;t live without. From command-line powerhouses to invaluable web utilities, this is the ultimate list of free and open-source tools for both seasoned professionals and aspiring enthusiasts.\u003c/p\u003e\n\n\u003cp\u003ePlus, we break down two major developing stories: the Texas AG\u0026#39;s massive lawsuit against PowerSchools over a student data breach and a sophisticated new EDR bypass technique that every defender needs to know about. Stick around to hear why a simple calculator might be one of the most-used tools in our arsenal.\u003c/p\u003e\n\n\u003cp\u003eIn this episode, we discuss:\u003c/p\u003e\n\n\u003cp\u003e00:00 - Intro, Beer Reviews \u0026amp; Upcoming Conferences\u003cbr\u003e\n05:37 - Texas Sues PowerSchools Over Massive Student Data Breach\u003cbr\u003e\n14:37 - Can Hackers Bypass Your EDR With Raw Disk Reads?\u003cbr\u003e\n20:52 - Our Go-To Cybersecurity Tools\u003cbr\u003e\n22:48 - Richard\u0026#39;s List: Nmap, DNSDumpster, Shodan \u0026amp; More\u003cbr\u003e\n24:18 - Brazos\u0026#39;s List: MXToolbox, URLscan.io, and... Calculator\u003cbr\u003e\n29:10 - Mario\u0026#39;s List: CyberChef, 1Password, Wireshark \u0026amp; VSCode\u003cbr\u003e\n41:12 - Joseph\u0026#39;s List: KASM, Metasploit \u0026amp; the Power of a Good EDR\u003cbr\u003e\n44:18 - Duty Calls... 🪖\u003c/p\u003e\n\n\u003cp\u003eFrom foundational utilities to advanced analysis platforms, this episode is packed with recommendations to build out your own toolkit. What are your go-to tools? Let us know in the comments!\u003c/p\u003e\n\n\u003chr\u003e\n\n\u003cp\u003eConnect with Scinary Cybersecurity:\u003cbr\u003e\n\u003ca href=\"https://www.scinary.com\" rel=\"nofollow\"\u003ehttps://www.scinary.com\u003c/a\u003e\u003cbr\u003e\n\u003ca href=\"https://x.com/scinarycyber\" rel=\"nofollow\"\u003ehttps://x.com/scinarycyber\u003c/a\u003e\u003cbr\u003e\u003cbr\u003e\n\u003ca href=\"https://www.linkedin.com/company/scinarycyber/\" rel=\"nofollow\"\u003ehttps://www.linkedin.com/company/scinarycyber/\u003c/a\u003e\u003c/p\u003e","summary":"This week, the team cracks open a few beers and pulls back the curtain on the cybersecurity tools they can't live without.","date_published":"2025-09-12T07:00:00.000-05:00","attachments":[{"url":"https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/2b9a8eda-03f9-4c17-95bc-5edd793cb6b2.mp3","mime_type":"audio/mpeg","size_in_bytes":65091478,"duration_in_seconds":2687}]},{"id":"a0c64b42-d412-4d44-97f3-504f724fa21f","title":"Episode 20: From Our First Intern to Rival CEO: Hacking with Jason Phillips","url":"https://scinary-info-nexus.fireside.fm/20","content_text":"Join us for a journey through the past, present, and future of offensive security. Jason shares his 'living off the land' techniques, discusses the very real threat of AI-driven ransomware, and explains why even the most sophisticated EDR solutions might not be enough to stop a determined attacker. Stick around for some hilarious and humbling stories from the scrappy early days of Scinary.\n\nIn this episode, we discuss:\n\n\nThe Rise of AI Ransomware: Is your network ready for polymorphic malware?\nEDR Evasion: How attackers use simple tools to bypass complex defenses.\nLiving Off The Land: Exploiting MS SQL and other built-in tools.\nThe day Richard deleted a client's entire Active directory.\nThe \"Abraham Lincoln\" philosophy for running a successful pen test team.\nWar stories from physical penetration tests and red team engagements.\n\n\nFrom disastrous first jobs to building successful companies, this is an episode you don't want to miss. Let's discuss.","content_html":"\u003cp\u003eJoin us for a journey through the past, present, and future of offensive security. Jason shares his \u0026#39;living off the land\u0026#39; techniques, discusses the very real threat of AI-driven ransomware, and explains why even the most sophisticated EDR solutions might not be enough to stop a determined attacker. Stick around for some hilarious and humbling stories from the scrappy early days of Scinary.\u003c/p\u003e\n\n\u003cp\u003eIn this episode, we discuss:\u003c/p\u003e\n\n\u003cul\u003e\n\u003cli\u003eThe Rise of AI Ransomware: Is your network ready for polymorphic malware?\u003c/li\u003e\n\u003cli\u003eEDR Evasion: How attackers use simple tools to bypass complex defenses.\u003c/li\u003e\n\u003cli\u003eLiving Off The Land: Exploiting MS SQL and other built-in tools.\u003c/li\u003e\n\u003cli\u003eThe day Richard deleted a client\u0026#39;s \u003cem\u003eentire\u003c/em\u003e Active directory.\u003c/li\u003e\n\u003cli\u003eThe \u0026quot;Abraham Lincoln\u0026quot; philosophy for running a successful pen test team.\u003c/li\u003e\n\u003cli\u003eWar stories from physical penetration tests and red team engagements.\u003c/li\u003e\n\u003c/ul\u003e\n\n\u003cp\u003eFrom disastrous first jobs to building successful companies, this is an episode you don\u0026#39;t want to miss. Let\u0026#39;s discuss.\u003c/p\u003e","summary":"This week, we go back to our roots and sit down with a very special guest: Jason Phillips, the founder of Mustang Cyber and, once upon a time, the very first intern at Scinary Cybersecurity.","date_published":"2025-09-02T07:00:00.000-05:00","attachments":[{"url":"https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/a0c64b42-d412-4d44-97f3-504f724fa21f.mp3","mime_type":"audio/mpeg","size_in_bytes":151516800,"duration_in_seconds":3787}]},{"id":"0083e158-6860-483b-8256-3304c769ab18","title":"Episode 19: Why Your Cybersecurity Bill Is a Ripoff","url":"https://scinary-info-nexus.fireside.fm/19","content_text":"Welcome to the Scinary Information Nexus! This week, we're going full medieval with mead and Viking helmets while exposing the most predatory pricing schemes in cybersecurity. Join Richard Martin, Joseph Hamilton, Mario Ortiz, and Brazos Wortham as they tear apart the industry's worst business practices.\n\nFrom bandwidth-based pricing that increases your bill during DDoS attacks to gamified token systems designed to separate you from your money, we're calling out the vendors who prioritize profit over protection.\n\n🗡️ In this episode, we expose:\n\n\nClickFix Attacks: Why users keep copying malicious PowerShell commands and how to stop them\nBandwidth Pricing Scams: How your security bill skyrockets when you're under attack\nToken-Based Ripoffs: Why cybersecurity borrowed the worst parts of mobile gaming\nEmail Security Highway Robbery: Charging for every mailbox whether you need protection or not\nThe 90-Day Contract Trap: How vendors lock you in with buried renewal clauses\nCost-Plus vs. Predatory: Why simple pricing beats convoluted schemes every time\nNetwork Monitoring vs. EDR: Why you need both for complete protection\n\n\nFrom Texas Mead Works' finest beverages to exposing vendors who can't give you a quote without calling France, this episode covers everything wrong with cybersecurity pricing - and how to avoid getting ripped off.\n\n\"If you can't tell me what I'm going to pay within 30 minutes, that's a scam.\" - Richard Martin\n\n\n\n🍯 Featured Mead (Texas Mead Works - not a sponsor, but they should be):\n\n\nBlackberry Melomel\nJalapeño Mead\nDark Wizard\nSweet Honey\n\n\nConnect with Scinary Cybersecurity:\nhttps://www.scinary.com\nhttps://x.com/scinarycyber\nhttps://www.linkedin.com/company/scinarycyber/\n\ncybersecurity #podcast #infosec #sysadmin","content_html":"\u003cp\u003eWelcome to the Scinary Information Nexus! This week, we\u0026#39;re going full medieval with mead and Viking helmets while exposing the most predatory pricing schemes in cybersecurity. Join Richard Martin, Joseph Hamilton, Mario Ortiz, and Brazos Wortham as they tear apart the industry\u0026#39;s worst business practices.\u003c/p\u003e\n\n\u003cp\u003eFrom bandwidth-based pricing that increases your bill during DDoS attacks to gamified token systems designed to separate you from your money, we\u0026#39;re calling out the vendors who prioritize profit over protection.\u003c/p\u003e\n\n\u003cp\u003e🗡️ In this episode, we expose:\u003c/p\u003e\n\n\u003cul\u003e\n\u003cli\u003eClickFix Attacks: Why users keep copying malicious PowerShell commands and how to stop them\u003c/li\u003e\n\u003cli\u003eBandwidth Pricing Scams: How your security bill skyrockets when you\u0026#39;re under attack\u003c/li\u003e\n\u003cli\u003eToken-Based Ripoffs: Why cybersecurity borrowed the worst parts of mobile gaming\u003c/li\u003e\n\u003cli\u003eEmail Security Highway Robbery: Charging for every mailbox whether you need protection or not\u003c/li\u003e\n\u003cli\u003eThe 90-Day Contract Trap: How vendors lock you in with buried renewal clauses\u003c/li\u003e\n\u003cli\u003eCost-Plus vs. Predatory: Why simple pricing beats convoluted schemes every time\u003c/li\u003e\n\u003cli\u003eNetwork Monitoring vs. EDR: Why you need both for complete protection\u003c/li\u003e\n\u003c/ul\u003e\n\n\u003cp\u003eFrom Texas Mead Works\u0026#39; finest beverages to exposing vendors who can\u0026#39;t give you a quote without calling France, this episode covers everything wrong with cybersecurity pricing - and how to avoid getting ripped off.\u003c/p\u003e\n\n\u003cp\u003e\u003cem\u003e\u0026quot;If you can\u0026#39;t tell me what I\u0026#39;m going to pay within 30 minutes, that\u0026#39;s a scam.\u0026quot;\u003c/em\u003e - Richard Martin\u003c/p\u003e\n\n\u003chr\u003e\n\n\u003cp\u003e🍯 Featured Mead (Texas Mead Works - not a sponsor, but they should be):\u003c/p\u003e\n\n\u003cul\u003e\n\u003cli\u003eBlackberry Melomel\u003c/li\u003e\n\u003cli\u003eJalapeño Mead\u003c/li\u003e\n\u003cli\u003eDark Wizard\u003c/li\u003e\n\u003cli\u003eSweet Honey\u003c/li\u003e\n\u003c/ul\u003e\n\n\u003cp\u003eConnect with Scinary Cybersecurity:\u003cbr\u003e\n\u003ca href=\"https://www.scinary.com\" rel=\"nofollow\"\u003ehttps://www.scinary.com\u003c/a\u003e\u003cbr\u003e\n\u003ca href=\"https://x.com/scinarycyber\" rel=\"nofollow\"\u003ehttps://x.com/scinarycyber\u003c/a\u003e\u003cbr\u003e\u003cbr\u003e\n\u003ca href=\"https://www.linkedin.com/company/scinarycyber/\" rel=\"nofollow\"\u003ehttps://www.linkedin.com/company/scinarycyber/\u003c/a\u003e\u003c/p\u003e\n\n\u003ch1\u003ecybersecurity #podcast #infosec #sysadmin\u003c/h1\u003e","summary":"This week, we're going full medieval with mead and Viking helmets while exposing the most predatory pricing schemes in cybersecurity.","date_published":"2025-08-26T08:00:00.000-05:00","attachments":[{"url":"https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/0083e158-6860-483b-8256-3304c769ab18.mp3","mime_type":"audio/mpeg","size_in_bytes":74930093,"duration_in_seconds":4683}]},{"id":"ba9e6eb4-4b5f-4eaa-b55b-52c57c3bf640","title":"Episode 18: Incident Response War Stories: How We Stop Real-World Cyberattacks","url":"https://scinary-info-nexus.fireside.fm/18","content_text":"Welcome to the Scinary Information Nexus! This week, the beer is flowing and the IR line is ringing off the hook. Join Richard Martin, Joseph Hamilton, Mario Ortiz, and Brazos Wortham as they pull back the curtain on the chaotic, non-stop world of Incident Response.\n\nWhen an attacker is inside your network, every second counts. The team shares real-world stories from the cybersecurity front lines, breaking down the attacks that are hitting organizations right now and the playbook for how to fight back.\n\nIn this episode, we expose:\n\n\nThe \"Oh Sh*t!\" Moment: The real stages of Incident Response.\nThe \"ClickFix\" Attack: How SEO poisoning tricks users into handing over the keys.\nBusiness Email Compromise (BEC): How one click can infect an entire network.\nMFA Isn't Enough: Bypassing security with Adversary-in-the-Middle proxy attacks.\nYour Biggest Weakness: Why misconfigured SSL-VPNs are a gateway for ransomware.\nThe Great Debate: Who has better logs, Microsoft O365 or Google Workspace?\nPortable Executables: The reason \"no local admin rights\" won't save you.\nYour First Move: What to do (and NOT do) when you find an intruder.\n\n\nFrom compromised student accounts to brazen attackers who don't bother hiding their tracks, this is an unfiltered look at what it takes to defend a network.\n\n\n\nConnect with Scinary Cybersecurity:\n\nhttps://www.scinary.com\nhttps://x.com/scinarycyber\nhttps://www.linkedin.com/company/scinarycyber/\n\nincidentresponse #cybersecurity #infosec","content_html":"\u003cp\u003eWelcome to the Scinary Information Nexus! This week, the beer is flowing and the IR line is ringing off the hook. Join Richard Martin, Joseph Hamilton, Mario Ortiz, and Brazos Wortham as they pull back the curtain on the chaotic, non-stop world of Incident Response.\u003c/p\u003e\n\n\u003cp\u003eWhen an attacker is inside your network, every second counts. The team shares real-world stories from the cybersecurity front lines, breaking down the attacks that are hitting organizations right now and the playbook for how to fight back.\u003c/p\u003e\n\n\u003cp\u003eIn this episode, we expose:\u003c/p\u003e\n\n\u003cul\u003e\n\u003cli\u003eThe \u0026quot;Oh Sh*t!\u0026quot; Moment: The real stages of Incident Response.\u003c/li\u003e\n\u003cli\u003eThe \u0026quot;ClickFix\u0026quot; Attack: How SEO poisoning tricks users into handing over the keys.\u003c/li\u003e\n\u003cli\u003eBusiness Email Compromise (BEC): How one click can infect an entire network.\u003c/li\u003e\n\u003cli\u003eMFA Isn\u0026#39;t Enough: Bypassing security with Adversary-in-the-Middle proxy attacks.\u003c/li\u003e\n\u003cli\u003eYour Biggest Weakness: Why misconfigured SSL-VPNs are a gateway for ransomware.\u003c/li\u003e\n\u003cli\u003eThe Great Debate: Who has better logs, Microsoft O365 or Google Workspace?\u003c/li\u003e\n\u003cli\u003ePortable Executables: The reason \u0026quot;no local admin rights\u0026quot; won\u0026#39;t save you.\u003c/li\u003e\n\u003cli\u003eYour First Move: What to do (and NOT do) when you find an intruder.\u003c/li\u003e\n\u003c/ul\u003e\n\n\u003cp\u003eFrom compromised student accounts to brazen attackers who don\u0026#39;t bother hiding their tracks, this is an unfiltered look at what it takes to defend a network.\u003c/p\u003e\n\n\u003chr\u003e\n\n\u003cp\u003eConnect with Scinary Cybersecurity:\u003c/p\u003e\n\n\u003cp\u003e\u003ca href=\"https://www.scinary.com\" rel=\"nofollow\"\u003ehttps://www.scinary.com\u003c/a\u003e\u003cbr\u003e\n\u003ca href=\"https://x.com/scinarycyber\" rel=\"nofollow\"\u003ehttps://x.com/scinarycyber\u003c/a\u003e\u003cbr\u003e\n\u003ca href=\"https://www.linkedin.com/company/scinarycyber/\" rel=\"nofollow\"\u003ehttps://www.linkedin.com/company/scinarycyber/\u003c/a\u003e\u003c/p\u003e\n\n\u003ch1\u003eincidentresponse #cybersecurity #infosec\u003c/h1\u003e","summary":"The team shares real-world stories from the cybersecurity front lines, breaking down the attacks that are hitting organizations right now and the playbook for how to fight back.","date_published":"2025-08-19T07:00:00.000-05:00","attachments":[{"url":"https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/ba9e6eb4-4b5f-4eaa-b55b-52c57c3bf640.mp3","mime_type":"audio/mpeg","size_in_bytes":129246857,"duration_in_seconds":4038}]},{"id":"b58d758d-0171-4d27-b1a6-2c014b459a41","title":"Episode 17: Revenge Hacking: Justice or Just Illegal?","url":"https://scinary-info-nexus.fireside.fm/17","content_text":"Welcome to the Scinary Information Nexus! This week, the team tackles a controversial and ethically murky corner of the cyber world: Offensive Security and the temptation to \"hack back\"\n\nWhen an attacker breaches your network, is fighting back a righteous act of justice or a dangerous form of vigilantism? Join Richard Martin, Joseph Hamilton, Brazos Wortham, and Director of Cybersecurity Operations Tye Valdis as they break down the minefield of digital retaliation.\n\nIn this episode, we expose:\n\n\nThe \"Burn the House Down\" Dilemma\nOffensive Security vs. Revenge Hacking: What's the difference?\nThe Attribution Problem: Who are you really attacking?\nCollateral Damage \u0026amp; Poking the Nation-State Bear\nWhy Hacking Back is ILLEGAL (Computer Fraud and Abuse Act)\nReal-World Examples: Stuxnet, Microsoft, and the Government\nWhy \"Cyber-Batman\" Has No Jurisdiction\n\n\nIs taking the fight to the enemy a smart strategy, or will you just end up interfering with an FBI operation and getting yourself in legal trouble? Let's discuss.\n\n\n\nConnect with Scinary Cybersecurity:\n\nhttps://www.scinary.com\nhttps://x.com/scinarycyber\n\nOffensiveSecurity #Cybersecurity #EthicalHacking #HackBack #PenetrationTesting #CyberLaw #InfoSec #DEFCON","content_html":"\u003cp\u003eWelcome to the Scinary Information Nexus! This week, the team tackles a controversial and ethically murky corner of the cyber world: Offensive Security and the temptation to \u0026quot;hack back\u0026quot;\u003c/p\u003e\n\n\u003cp\u003eWhen an attacker breaches your network, is fighting back a righteous act of justice or a dangerous form of vigilantism? Join Richard Martin, Joseph Hamilton, Brazos Wortham, and Director of Cybersecurity Operations Tye Valdis as they break down the minefield of digital retaliation.\u003c/p\u003e\n\n\u003cp\u003eIn this episode, we expose:\u003c/p\u003e\n\n\u003cul\u003e\n\u003cli\u003eThe \u0026quot;Burn the House Down\u0026quot; Dilemma\u003c/li\u003e\n\u003cli\u003eOffensive Security vs. Revenge Hacking: What\u0026#39;s the difference?\u003c/li\u003e\n\u003cli\u003eThe Attribution Problem: Who are you \u003cem\u003ereally\u003c/em\u003e attacking?\u003c/li\u003e\n\u003cli\u003eCollateral Damage \u0026amp; Poking the Nation-State Bear\u003c/li\u003e\n\u003cli\u003eWhy Hacking Back is ILLEGAL (Computer Fraud and Abuse Act)\u003c/li\u003e\n\u003cli\u003eReal-World Examples: Stuxnet, Microsoft, and the Government\u003c/li\u003e\n\u003cli\u003eWhy \u0026quot;Cyber-Batman\u0026quot; Has No Jurisdiction\u003c/li\u003e\n\u003c/ul\u003e\n\n\u003cp\u003eIs taking the fight to the enemy a smart strategy, or will you just end up interfering with an FBI operation and getting yourself in legal trouble? Let\u0026#39;s discuss.\u003c/p\u003e\n\n\u003chr\u003e\n\n\u003cp\u003eConnect with Scinary Cybersecurity:\u003c/p\u003e\n\n\u003cp\u003e\u003ca href=\"https://www.scinary.com\" rel=\"nofollow\"\u003ehttps://www.scinary.com\u003c/a\u003e\u003cbr\u003e\n\u003ca href=\"https://x.com/scinarycyber\" rel=\"nofollow\"\u003ehttps://x.com/scinarycyber\u003c/a\u003e\u003c/p\u003e\n\n\u003ch1\u003eOffensiveSecurity #Cybersecurity #EthicalHacking #HackBack #PenetrationTesting #CyberLaw #InfoSec #DEFCON\u003c/h1\u003e","summary":"This week, the team tackles a controversial and ethically murky corner of the cyber world: Offensive Security and the temptation to \"hack back\". When an attacker breaches your network, is fighting back a righteous act of justice or a dangerous form of vigilantism?","date_published":"2025-08-11T00:00:00.000-05:00","attachments":[{"url":"https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/b58d758d-0171-4d27-b1a6-2c014b459a41.mp3","mime_type":"audio/mpeg","size_in_bytes":114439048,"duration_in_seconds":3576}]},{"id":"fa4df968-97f3-4dae-94d9-0dfdbe36b9cd","title":"Episode 16: The Dark Side of Venture Capital","url":"https://scinary-info-nexus.fireside.fm/16","content_text":"Welcome to the Scinary Information Nexus! This week, fueled by our friends at Southern Roots Brewing and AdiraNow, we're on camera to pull back the curtain on one of the tech world's most powerful and misunderstood forces: Venture Capital.\n\nJoin CEO Richard Martin, SOC Managers Mario Ortiz and Joseph Hamilton, and Director of Strategic Initiatives Brazos Wortham as we dissect the high-stakes world of VC funding.\n\nWe expose:\n\n\nThe VC Gamble\nIs Your Pension at Risk?\nThe TikTok Ban Hypocrisy\nHype Over Diligence\nExit Strategy Over Everything\nThe Transparency Black Hole\n\n\nIs the tech industry built on a foundation of responsible innovation or just a high-stakes casino game played with other people's money? Join the discussion.\n\n\n\nThis episode is proudly sponsored by:\n\nSouthern Roots Brewing Company: A Waco staple! For the best craft beer and local vibes, visit our friends at Southern Roots. Tell them Scinary sent you!\n\nAdiraNow: The go-to technology partner for local government and education in Oklahoma. Thank you to Dr. Jack Green and Gaitha Milligan for their support (and the Blanton's!).\n\nConnect with Scinary Cybersecurity:\n\nhttps://www.scinary.com\nhttps://x.com/scinarycyber","content_html":"\u003cp\u003eWelcome to the Scinary Information Nexus! This week, fueled by our friends at Southern Roots Brewing and AdiraNow, we\u0026#39;re on camera to pull back the curtain on one of the tech world\u0026#39;s most powerful and misunderstood forces: Venture Capital.\u003c/p\u003e\n\n\u003cp\u003eJoin CEO Richard Martin, SOC Managers Mario Ortiz and Joseph Hamilton, and Director of Strategic Initiatives Brazos Wortham as we dissect the high-stakes world of VC funding.\u003c/p\u003e\n\n\u003cp\u003eWe expose:\u003c/p\u003e\n\n\u003cul\u003e\n\u003cli\u003eThe VC Gamble\u003c/li\u003e\n\u003cli\u003eIs Your Pension at Risk?\u003c/li\u003e\n\u003cli\u003eThe TikTok Ban Hypocrisy\u003c/li\u003e\n\u003cli\u003eHype Over Diligence\u003c/li\u003e\n\u003cli\u003eExit Strategy Over Everything\u003c/li\u003e\n\u003cli\u003eThe Transparency Black Hole\u003c/li\u003e\n\u003c/ul\u003e\n\n\u003cp\u003eIs the tech industry built on a foundation of responsible innovation or just a high-stakes casino game played with other people\u0026#39;s money? Join the discussion.\u003c/p\u003e\n\n\u003chr\u003e\n\n\u003cp\u003eThis episode is proudly sponsored by:\u003c/p\u003e\n\n\u003cp\u003e\u003cem\u003eSouthern Roots Brewing Company:\u003c/em\u003e A Waco staple! For the best craft beer and local vibes, visit our friends at Southern Roots. Tell them Scinary sent you!\u003c/p\u003e\n\n\u003cp\u003e\u003cem\u003eAdiraNow:\u003c/em\u003e The go-to technology partner for local government and education in Oklahoma. Thank you to Dr. Jack Green and Gaitha Milligan for their support (and the Blanton\u0026#39;s!).\u003c/p\u003e\n\n\u003cp\u003eConnect with Scinary Cybersecurity:\u003c/p\u003e\n\n\u003cp\u003e\u003ca href=\"https://www.scinary.com\" rel=\"nofollow\"\u003ehttps://www.scinary.com\u003c/a\u003e\u003cbr\u003e\n\u003ca href=\"https://x.com/scinarycyber\" rel=\"nofollow\"\u003ehttps://x.com/scinarycyber\u003c/a\u003e\u003c/p\u003e","summary":"Join CEO Richard Martin, SOC Managers Mario Ortiz and Joseph Hamilton, and Director of Strategic Initiatives Brazos Wortham as we dissect the high-stakes world of VC funding.\r\n\r\nIs the tech industry built on a foundation of responsible innovation or just a high-stakes casino game played with other people's money? Join the discussion.","date_published":"2025-08-08T21:00:00.000-05:00","attachments":[{"url":"https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/fa4df968-97f3-4dae-94d9-0dfdbe36b9cd.mp3","mime_type":"audio/mpeg","size_in_bytes":119184529,"duration_in_seconds":3724}]},{"id":"038955cd-c502-4083-8336-a40a3a2057e7","title":"Episode 15: Recall, Copilot and Your Data Security","url":"https://scinary-info-nexus.fireside.fm/15","content_text":"In this episode we discuss Microsoft's implementation of AI in the form of Copilot and Recall. We also drink beer from Southern Roots Brewing Company in Waco, Texas. https://southernrootsbrewingco.com/","content_html":"\u003cp\u003eIn this episode we discuss Microsoft\u0026#39;s implementation of AI in the form of Copilot and Recall. We also drink beer from Southern Roots Brewing Company in Waco, Texas. \u003ca href=\"https://southernrootsbrewingco.com/\" rel=\"nofollow\"\u003ehttps://southernrootsbrewingco.com/\u003c/a\u003e\u003c/p\u003e","summary":"","date_published":"2025-07-25T16:00:00.000-05:00","attachments":[{"url":"https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/038955cd-c502-4083-8336-a40a3a2057e7.mp3","mime_type":"audio/mpeg","size_in_bytes":111709576,"duration_in_seconds":3490}]},{"id":"c8645d7e-3d08-4373-a5a8-035cf6eafce9","title":"Episode 14: TikTok, TikTok","url":"https://scinary-info-nexus.fireside.fm/14","content_text":"","content_html":"","summary":"In this episode we discuss the absurdity of politicians fascination with TikTok","date_published":"2025-07-18T06:00:00.000-05:00","attachments":[{"url":"https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/c8645d7e-3d08-4373-a5a8-035cf6eafce9.mp3","mime_type":"audio/mpeg","size_in_bytes":98798309,"duration_in_seconds":3084}]},{"id":"a43ed1ca-0fbb-4b00-9074-31847ec90f1c","title":"Episode 13: Is it a Pen Test or a Pen Test?","url":"https://scinary-info-nexus.fireside.fm/13","content_text":"","content_html":"","summary":"We discuss the varying definitions of penetration testing and what to look for in a pen test.","date_published":"2025-07-11T14:00:00.000-05:00","attachments":[{"url":"https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/a43ed1ca-0fbb-4b00-9074-31847ec90f1c.mp3","mime_type":"audio/mpeg","size_in_bytes":88188512,"duration_in_seconds":3674}]},{"id":"60d1967d-df60-4e83-91df-87bc847baafd","title":"Episode 12: Your Cybersecurity Insurance is Judging You","url":"https://scinary-info-nexus.fireside.fm/12","content_text":"","content_html":"","summary":"We discuss cybersecurity insurance and our opinions on the industry","date_published":"2025-06-27T14:00:00.000-05:00","attachments":[{"url":"https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/60d1967d-df60-4e83-91df-87bc847baafd.mp3","mime_type":"audio/mpeg","size_in_bytes":67120160,"duration_in_seconds":2796}]},{"id":"8efde36f-5ac8-4561-8cf5-fbdc78e4abcd","title":"Episode 11: Our Take on Cybersecurity Jobs","url":"https://scinary-info-nexus.fireside.fm/11","content_text":"In this episode, we drink beer and tell you what we really think about cybersecurity career paths.","content_html":"\u003cp\u003eIn this episode, we drink beer and tell you what we really think about cybersecurity career paths.\u003c/p\u003e","summary":"","date_published":"2025-06-06T14:00:00.000-05:00","attachments":[{"url":"https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/8efde36f-5ac8-4561-8cf5-fbdc78e4abcd.mp3","mime_type":"audio/mpeg","size_in_bytes":79637942,"duration_in_seconds":4977}]},{"id":"633724c7-99ee-4c23-957c-da57587e4095","title":"Episode 10: Acronym Hell","url":"https://scinary-info-nexus.fireside.fm/10","content_text":"","content_html":"","summary":"In this episode we explore the ridiculousness that are acronyms in cybersec.","date_published":"2025-05-30T13:00:00.000-05:00","attachments":[{"url":"https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/633724c7-99ee-4c23-957c-da57587e4095.mp3","mime_type":"audio/mpeg","size_in_bytes":30325446,"duration_in_seconds":1895}]},{"id":"c4edb9d0-92ac-4e03-a8db-b96b43d2bb81","title":"Episode 9: We put the government in its place...kinda.","url":"https://scinary-info-nexus.fireside.fm/9","content_text":"","content_html":"","summary":"We go into the role of government in cybersecurity, drink a new beer, and talk about recent event in the ransomware space.","date_published":"2025-05-16T14:00:00.000-05:00","attachments":[{"url":"https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/c4edb9d0-92ac-4e03-a8db-b96b43d2bb81.mp3","mime_type":"audio/mpeg","size_in_bytes":49335066,"duration_in_seconds":3083}]},{"id":"899d4e80-e684-48a6-a91a-8f134aab375a","title":"Episode 8: One year later","url":"https://scinary-info-nexus.fireside.fm/8","content_text":"","content_html":"","summary":"We've done some things... I promise.","date_published":"2025-05-09T14:00:00.000-05:00","attachments":[{"url":"https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/899d4e80-e684-48a6-a91a-8f134aab375a.mp3","mime_type":"audio/mpeg","size_in_bytes":54775222,"duration_in_seconds":3423}]},{"id":"9fd99aec-5c6e-4f47-a541-a104d211d80d","title":"Episode 7: Vault7: Part 2","url":"https://scinary-info-nexus.fireside.fm/7","content_text":"Part 2 of our Vault 7 episode. Joined by our collegue Hunter Isham, Mario and Joseph explore the C.I.A. leak known as Vault 7. This episode has all of the essentials; comparing our favorite 3 letter agencies to each other, trying to figure out what they may be capable of today, and contemplating what that means for everyone else. So come have fun with us as we dive into another Conspiracy riddled leak of national security importance... even though it's a few years too late.","content_html":"\u003cp\u003ePart 2 of our Vault 7 episode. Joined by our collegue Hunter Isham, Mario and Joseph explore the C.I.A. leak known as Vault 7. This episode has all of the essentials; comparing our favorite 3 letter agencies to each other, trying to figure out what they may be capable of today, and contemplating what that means for everyone else. So come have fun with us as we dive into another Conspiracy riddled leak of national security importance... even though it\u0026#39;s a few years too late.\u003c/p\u003e","summary":"Continuation our talk about the Vault 7 leak and what the C.I.A. used for their clandestine information gathering. We get into the details of each part of the leak and give our ample conjecture on what that may mean for the Cybersecurity industry today.","date_published":"2023-04-10T14:00:00.000-05:00","attachments":[{"url":"https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/9fd99aec-5c6e-4f47-a541-a104d211d80d.mp3","mime_type":"audio/mpeg","size_in_bytes":76878141,"duration_in_seconds":2559}]},{"id":"c4bc39ca-ed64-4ea4-a5d6-8b6f9d26614f","title":"Episode 6: Vault7: Part 1","url":"https://scinary-info-nexus.fireside.fm/6","content_text":"Joined by our collegue Hunter Isham, Mario and Joseph explore the C.I.A. leak known as Vault 7. This episode has all of the essentials; comparing our favorite 3 letter agencies to each other, trying to figure out what they may be capable of today, and contemplating what that means for everyone else. So come have fun with us as we dive into another Conspiracy riddled leak of national security importance... even though it's a few years too late.","content_html":"\u003cp\u003eJoined by our collegue Hunter Isham, Mario and Joseph explore the C.I.A. leak known as Vault 7. This episode has all of the essentials; comparing our favorite 3 letter agencies to each other, trying to figure out what they may be capable of today, and contemplating what that means for everyone else. So come have fun with us as we dive into another Conspiracy riddled leak of national security importance... even though it\u0026#39;s a few years too late.\u003c/p\u003e","summary":"Today we talk about the Vault 7 leak and what the C.I.A. used for their clandestine information gathering. We get into the details of each part of the leak and give our ample conjecture on what that may mean for the Cybersecurity industry today.","date_published":"2023-02-22T15:00:00.000-06:00","attachments":[{"url":"https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/c4bc39ca-ed64-4ea4-a5d6-8b6f9d26614f.mp3","mime_type":"audio/mpeg","size_in_bytes":89674893,"duration_in_seconds":2914}]},{"id":"3e6c8f66-5e6f-4c24-b3b4-1caf92b682ca","title":"Episode 5: PenTesting with Jason Phillips","url":"https://scinary-info-nexus.fireside.fm/5","content_text":"On this episode we look into the world of PenTesting and what some of the pitfalls and ethical conundrums mean for the cyber practitioner. Our experts give us first hand anecdotes of what they've experienced in the field while Mario and Joseph try no to derail the episode too much. Come explore the crazy world of red teams, penetration tests, and all things cybersecurity with your Scinary Information Nexus.\n\nMustang Cyber: https://mustangcyber.com\n\nScinary Cybersecurity: https://www.scinary.com","content_html":"\u003cp\u003eOn this episode we look into the world of PenTesting and what some of the pitfalls and ethical conundrums mean for the cyber practitioner. Our experts give us first hand anecdotes of what they\u0026#39;ve experienced in the field while Mario and Joseph try no to derail the episode too much. Come explore the crazy world of red teams, penetration tests, and all things cybersecurity with your Scinary Information Nexus.\u003c/p\u003e\n\n\u003cp\u003eMustang Cyber: \u003ca href=\"https://mustangcyber.com\" rel=\"nofollow\"\u003ehttps://mustangcyber.com\u003c/a\u003e\u003c/p\u003e\n\n\u003cp\u003eScinary Cybersecurity: \u003ca href=\"https://www.scinary.com\" rel=\"nofollow\"\u003ehttps://www.scinary.com\u003c/a\u003e\u003c/p\u003e","summary":"A conversation with the CEO of Mustang Cyber and our very own Director of Operations Tye Valdis.","date_published":"2022-11-28T14:00:00.000-06:00","attachments":[{"url":"https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/3e6c8f66-5e6f-4c24-b3b4-1caf92b682ca.mp3","mime_type":"audio/mpeg","size_in_bytes":71855301,"duration_in_seconds":2646}]},{"id":"cbd9a7ce-342e-4e08-a70f-f92e01590f69","title":"Episode 4: Ant Catalogue/Conspiracy Theories","url":"https://scinary-info-nexus.fireside.fm/4","content_text":"Fair warning, most of this episode is our personal opinions and speculation. That being said we will be going into the information leaked from the A.N.T. catalogue, conspiracies around the Stuxnet worm, and what keeps us up at night when it comes to our big government friends and their wonderful toys. It's a conspiracy nut convention and we're the squirrels. Come joing us on this fun ride into state threat actors.","content_html":"\u003cp\u003eFair warning, most of this episode is our personal opinions and speculation. That being said we will be going into the information leaked from the A.N.T. catalogue, conspiracies around the Stuxnet worm, and what keeps us up at night when it comes to our big government friends and their wonderful toys. It\u0026#39;s a conspiracy nut convention and we\u0026#39;re the squirrels. Come joing us on this fun ride into state threat actors.\u003c/p\u003e","summary":"We take a dive into the world of Advanced Persistent Threat actors as we look at Nation State actors and their capabilities. We'll look at the NSA A.N.T. catalogue and see if we can't shine a little light on the shadow organizations of the world.","date_published":"2022-09-19T17:00:00.000-05:00","attachments":[{"url":"https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/cbd9a7ce-342e-4e08-a70f-f92e01590f69.mp3","mime_type":"audio/mpeg","size_in_bytes":102918669,"duration_in_seconds":3469}]},{"id":"589ad254-87db-460b-b840-e2919e0063d4","title":"Episode 3: *BACK TO SCHOOL SPECIAL*","url":"https://scinary-info-nexus.fireside.fm/3","content_text":"Introducing!!! Richard Martin!!! Our Managing Partner of Sales joins us to talk about what keeps him up at night and what our clients can do to help him (and them) sleep better. Fair warning he's a man who speaks his mind and the filter doesn't always stay on. That being said, we had a few slip ups in the obscene language department, but we're talking about things that can destroy lives and organizations. Our boss don't play around folks. So come join us on this special episode and hopefully walk away with your own plan of action.","content_html":"\u003cp\u003eIntroducing!!! Richard Martin!!! Our Managing Partner of Sales joins us to talk about what keeps him up at night and what our clients can do to help him (and them) sleep better. Fair warning he\u0026#39;s a man who speaks his mind and the filter doesn\u0026#39;t always stay on. That being said, we had a few slip ups in the obscene language department, but we\u0026#39;re talking about things that can destroy lives and organizations. Our boss don\u0026#39;t play around folks. So come join us on this special episode and hopefully walk away with your own plan of action.\u003c/p\u003e","summary":"Our managing partner of Sales and Co-founder of Scinary Cybersecurity, Richard Martin, gives an honest assessment of the things tech departments in K-12 education can do to help secure themselves in today's threat landscape.","date_published":"2022-09-07T18:00:00.000-05:00","attachments":[{"url":"https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/589ad254-87db-460b-b840-e2919e0063d4.mp3","mime_type":"audio/mpeg","size_in_bytes":53219622,"duration_in_seconds":3326}]},{"id":"ef80115e-cd37-464a-8e99-e29f44f88e28","title":"Episode 2: Intern Insights","url":"https://scinary-info-nexus.fireside.fm/2","content_text":"","content_html":"","summary":"a conversation with our new batch of interns asking them what they've learned and where they might go next.","date_published":"2022-08-08T15:00:00.000-05:00","attachments":[{"url":"https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/ef80115e-cd37-464a-8e99-e29f44f88e28.mp3","mime_type":"audio/mpeg","size_in_bytes":46342269,"duration_in_seconds":1892}]},{"id":"2e53fce6-3dcb-4e6d-8d68-8bed3fceaea0","title":"Episode 1: P@ssw0rd!","url":"https://scinary-info-nexus.fireside.fm/1","content_text":"","content_html":"","summary":"a brief overview of passwords, why they frustrate us, what we should do about it, and what might happen to them in the future.","date_published":"2022-08-08T15:00:00.000-05:00","attachments":[{"url":"https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/2e53fce6-3dcb-4e6d-8d68-8bed3fceaea0.mp3","mime_type":"audio/mpeg","size_in_bytes":51058797,"duration_in_seconds":1780}]},{"id":"c6c29777-1172-4e4b-9f72-64ff3ba2ed4b","title":"Introduction to the Scinary Information Nexus","url":"https://scinary-info-nexus.fireside.fm/intro","content_text":"","content_html":"","summary":"An introduction to your hosts Joe and Mario. Come join us as we learn from industry experts and our peers about what it means to work in cybersecurity and what to keep an eye on in the future.","date_published":"2022-08-08T15:00:00.000-05:00","attachments":[{"url":"https://aphid.fireside.fm/d/1437767933/38ec063a-aaf5-42e5-975a-6ef30bb34326/c6c29777-1172-4e4b-9f72-64ff3ba2ed4b.mp3","mime_type":"audio/mpeg","size_in_bytes":11608077,"duration_in_seconds":438}]}]}