Legitimate Cybersecurity Podcasts
Episodes
A $29 Tracker Could Be Following You Right Now
08 May 2026
Contributed by Lukas
One could be hidden in your car, purse, luggage, or jacket — and it may cost less than dinner. Bluetooth trackers were built to find lost keys, but...
An Aquarium Hacked A Casino. Your House Is Next
04 May 2026
Contributed by Lukas
Gloria Globman — CTO of Acclaimed Technical Services, former Senior Cyber Advisor at the US Embassy in Tokyo, US Navy veteran, and Presidential Rank...
AI Is Now Faking Loved Ones and Setting Prices
27 Apr 2026
Contributed by Lukas
AI is no longer just answering prompts — it is imitating dead relatives, profiling shoppers, and helping companies decide what people pay. That mat...
Can AI Agents Actually Hack Systems?
18 Apr 2026
Contributed by Lukas
A new AI is being framed as a tool that can find zero-days fast and even “hack its way out” of containment. If that claim is real, defenders, dev...
Why Is LinkedIn Spying on Your Browser?
10 Apr 2026
Contributed by Lukas
A new lawsuit alleges LinkedIn may have been collecting data from inside users’ browsers in ways most people never expected. If that is true, this ...
What’s Inside the White House App?
04 Apr 2026
Contributed by Lukas
You expect a government app to inform you. You probably do not expect tracking capability, mystery dependencies, and sloppy security decisions. This ...
AI Is Already in Your Tools. No One Wrote the Rules
01 Apr 2026
Contributed by Lukas
AI is being forced into the tools you use every day before most companies have written real rules. That matters because one careless prompt can becom...
AI Is Replacing Tech Jobs With Insecure Code
20 Mar 2026
Contributed by Lukas
AI is starting to replace parts of white-collar work faster than most people realize. The bigger problem is that it may also flood the market with in...
Your TV Is Recording What You Watch
13 Mar 2026
Contributed by Lukas
Your smart TV may be taking snapshots of what you watch, even when you think you bypassed the built-in apps. That data can be used to identify show...
After the Breach, the Legal Crisis Begins
07 Mar 2026
Contributed by Lukas
A cyber incident is not just a technical problem. The legal response can shape what happens next, what gets disclosed, and how much worse the damage b...
The FBI Isn’t Your Cyber Defense Anymore (It’s Privatized Now)
03 Mar 2026
Contributed by Lukas
America’s cyber “first responder” isn’t the FBI anymore—it’s private companies. That shift changes what gets prioritized during a breach:...
AI Is Rewriting Compliance (GRC)
23 Feb 2026
Contributed by Lukas
Compliance isn’t “paperwork”—it’s the last line between your customers and the next Equifax-level mess. But GRC teams are stuck chasing scr...
Your Doorbell Camera Is Quietly Building a Surveillance Database
19 Feb 2026
Contributed by Lukas
You bought a security camera… but what you actually bought was a cloud evidence locker. And when you hit “delete,” it might only mean you lose ...
AI Agents Are Malware Now (And We’re Installing Them)
15 Feb 2026
Contributed by Lukas
AI agents aren’t just “tools” anymore — they’re getting delegated access, running workflows, calling APIs, and making decisions inside your ...
This Surveillance Network Is Spreading Quietly—And You Can’t Opt Out
11 Feb 2026
Contributed by Lukas
You can be tracked in the real world—without consent—just by driving down a public road. And the scariest part isn’t “live tracking”… i...
Your AI Agents Need Logins (Or They’ll Burn Your Company Down)
09 Feb 2026
Contributed by Lukas
AI is pushing security into a new failure mode: tools that don’t just talk… they act. If you don’t treat AI agents like identities—with guard...
Stop Saying You Have Nothing to Hide! It’s Costing You Money!
02 Feb 2026
Contributed by Lukas
The "I have nothing to hide" argument is dead. It’s not about secrecy anymore—it’s about your wallet. Most people assume data collection is j...
The TikTok ”Sale” is a Lie: Why the Algorithm remains the Threat
23 Jan 2026
Contributed by Lukas
Everyone thinks the TikTok problem is solved because "US Data stays in the US." That is a dangerous misunderstanding of how the technology works. I...
The Tools Cyber Pros Use To Monitor You!
19 Jan 2026
Contributed by Lukas
Your work laptop isn’t yours — and one legal issue inside your company can put your logins, browsing, and messages under review. We break down th...
AI is Hacking Your Brain! The Truth about Digital Affairs!
10 Jan 2026
Contributed by Lukas
AI can sound empathetic, supportive, even “therapeutic”—but it can’t be accountable. That gap matters most when someone is isolated, vulnerab...
AI Is Rebuilding the Dead — With Your Data
28 Dec 2025
Contributed by Lukas
Your body dies — but your accounts don’t. And now AI can be trained on the dead. So who “owns” your digital afterlife… and who gets to use ...
5 Holiday Scams That Drain Your Money Fast (Gift Cards, Texts, QR)
19 Dec 2025
Contributed by Lukas
Your gift card can be empty before you even buy it—and that’s just one of the holiday scams exploding right now. In December, attackers don’t n...
Your Phone, Your Car, Your Movies—You Don’t Actually Own ANY of It #cybersecurity
12 Dec 2025
Contributed by Lukas
Your smartphone, your streaming library, even your tractor—none of them actually belong to you. Companies can lock you out, delete your data, revoke...
Why Security Tools Are Designed To Fail (VP Revelations) #cybersecurity
05 Dec 2025
Contributed by Lukas
The cybersecurity industry is gaslighting you. We spend billions on dashboards that look pretty but act like "sleep paralysis demons" for the analysts...
The Drone Privacy Crisis: What No One Is Telling You. #cybersecurity
28 Nov 2025
Contributed by Lukas
Drones are showing up where they shouldn’t — over backyards, pools, windows, driveways, campsites, neighborhoods, and even over insurance customer...
SIM Swapping Is Back — And They Can Steal Your Phone Without Touching It #cybersecurity
21 Nov 2025
Contributed by Lukas
SIM swapping has returned — and the attackers have leveled up. In this episode, Frank, Dustin, and returning guest Chris Adkins break down how moder...
AI vs Religion: The Vatican Breaks Its Silence — And It’s Terrifying #cybersecurity
16 Nov 2025
Contributed by Lukas
The Vatican just issued a massive warning about AI — and it might be the most unexpected twist in the religion-tech debate yet. Frank and Dustin div...
Leonardo da Vinci Had Better Wi-Fi: The $100M Louvre Heist #cybersecurity
10 Nov 2025
Contributed by Lukas
What happens when the most secure museum on Earth has a Wi-Fi password that’s literally “louvre”? 💎 $100 million in jewels disappear, and ...
Haunted Networks: Possessed Printers, Phantom Texts, and the OG Computer ‘Bug’ #cybersecurity
31 Oct 2025
Contributed by Lukas
Tonight’s Halloween special gets deliciously weird. 🦇 Dustin and Frank unpack four true tech “hauntings”: • The Ghost in the Printer—Why...
AI Is Quietly Killing Entry-Level Jobs (And No One Wants To Admit It)
28 Oct 2025
Contributed by Lukas
Are we watching the ladder get pulled up? A new Harvard-linked analysis shows companies that adopt generative AI hire 7.7% fewer junior roles — a su...
The Day the Cloud Died: How One Outage Broke Everything
22 Oct 2025
Contributed by Lukas
What happens when ONE “cloud” hiccup in Virginia slams the brakes on your life—smart beds trap sleepers, Alexa goes dumb, Venmo sputters, and en...
AI Is Spying on You: Zero-Touch Hacks, Secret Data Leaks, and the “No Legal Privilege” Bombshell
17 Oct 2025
Contributed by Lukas
Your AI assistant is helpful… until it isn’t. In this episode, Frank and Dustin break down the zero-touch exploits (EchoLeak & ShadowLeak) tha...
AI Won’t Save You: James Gustafson on Junior Talent, Button-ology, and Real Risk Reduction
11 Oct 2025
Contributed by Lukas
Why train when you can just hire?” In this episode, BlueVoyant Senior Vulnerability & Risk Analyst James Gustafson explains why that mindset—a...
Shadow Credit Bureau Exposed: How LexisNexis Tracks Your Every Move (Even Roller Coasters!)
06 Oct 2025
Contributed by Lukas
What if your “credit score” wasn’t the full story? Frank and Dr. Dustin uncover LexisNexis, the massive data broker quietly collecting everythi...
Reddit’s Spiciest Cyber FAQs—Board Risk, Automation Fails, Pay Cuts & “Cyber Sucks”
29 Sep 2025
Contributed by Lukas
Dr. Dustin Brewer just passed his dissertation defense (👑 incoming), so we celebrated the only way we know how: by tackling Reddit’s most controv...
From US Intelligence to DoD Cyber Ops: Frank & Dustin’s Origin Stories in Cybersecurity
22 Sep 2025
Contributed by Lukas
Why should you listen to us? Honestly—you shouldn’t. But if you do, know this: we’re not just two jokers talking theory. In this episode of L...
Secret Algorithms Controlling You! Are You the User… or the Product?
12 Sep 2025
Contributed by Lukas
Are algorithms helping—or handling—you? Frank and Dustin dive into how recommender systems, data brokers, and AI-powered platforms shape your news...
From Submarines to Cybersecurity: Chris Adkins’ Wild Journey Into Cyber Defense
05 Sep 2025
Contributed by Lukas
What do submarines, Linux servers, Apple X Servers, and SOC analysts all have in common? They were all part of Chris Adkins’ path into cybersecurity...
He Helped Take Down the Dark Web (Twice) — Vincent D’Agostino on DFIR, FBI & Real-World Cyber
25 Aug 2025
Contributed by Lukas
Former FBI agent and attorney Vincent “Vinnie” D’Agostino (now Head of Digital Forensics & Incident Response at BlueVoyant) joins us to unpa...
ChatGPT-5: Smarter Hackers, Dumber Defenders?
18 Aug 2025
Contributed by Lukas
ChatGPT-5 is here — but is it really the leap forward everyone’s claiming? In this episode of Legitimate Cybersecurity, Frank and Dustin break dow...
From Recon to Wrecked: The Cyber Kill Chain Breakdown (With Laughs)
12 Aug 2025
Contributed by Lukas
What if you could break down every cyberattack into just 7 steps? In this episode of Legitimate Cybersecurity, Frank and Dustin dive deep into the Cy...
Quantum Day is Coming: Will Quantum Computing Break Cybersecurity?
04 Aug 2025
Contributed by Lukas
Quantum computing is no longer science fiction—it’s a ticking clock for modern encryption. In this episode of Legitimate Cybersecurity, Frank and ...
Internet of (Terrifying) Things: IoT Hacks, Biochips & Beer Bots
24 Jul 2025
Contributed by Lukas
Today on Legitimate Cybersecurity, Frank and Dustin dive deep into the weird, wild, and worrying world of IoT (Internet of Things) — from smart ther...
We’re Losing the Cyber War — Here’s Why | UMD’s Charles Harry
18 Jul 2025
Contributed by Lukas
Dr. Charles Harry — former NSA leader, cybersecurity strategist, and professor at the University of Maryland — joins Legitimate Cybersecurity to e...
You Can’t Trust Your Eyes or Ears Anymore: How AI Is Breaking Cybersecurity
14 Jul 2025
Contributed by Lukas
🎙 In this episode of Legitimate Cybersecurity, we dive deep into the unsettling reality of AI in modern cybercrime. Senator Marco Rubio was impers...
The Truth About Ethical Hacking (Pen Testing Myths Busted!)
10 Jul 2025
Contributed by Lukas
Are you curious about penetration testing, aka legal hacking? In this episode of Legitimate Cybersecurity, Frank and Dustin tear down the myths of hac...
AI Can Write a Better Phishing Email Than You. Here’s Why That Should Terrify You
28 Jun 2025
Contributed by Lukas
Sorry in advance for the wonk audio!! AI is everywhere—and it's not just writing poems or generating cat pics. In this episode of Legitimate Cybe...
Quiet Defenders & Cyber Truths: Micah Heaton on AI, Advocacy, and Real-World Security
24 Jun 2025
Contributed by Lukas
In this powerful and wide-ranging episode of Legitimate Cybersecurity, Frank and Dustin are joined by Micah Heaton, Executive Director of Product &...
He Took Down Silk Road — Now He’s Warning About a 16 Billion Record Breach
23 Jun 2025
Contributed by Lukas
What happens when the man who brought down Silk Road and Silk Road 2.0 joins us to talk about the largest credential breach in history? In this epi...
Cyber Maturity Isn’t What You Think — Here’s the Real Truth (and a Few Ghost Tables)
16 Jun 2025
Contributed by Lukas
🎙️ Welcome back to another episode of Legitimate Cybersecurity, where Frank and Dustin dive deep into the misunderstood world of cyber maturity. ...
Cyber Never Sleeps (and Neither Do We): Frameworks, Failures & the Fight for Digital Resilience
21 May 2025
Contributed by Lukas
In this conversation, Frank and Dustin explore the critical themes surrounding cybersecurity, including its impact on businesses, the vulnerabilities ...
Cybersecurity, Dishwashers, and AI Threats: Welcome Back!
13 May 2025
Contributed by Lukas
After a three-year hiatus, Frank Downs and Dustin Brewer are back—older, wiser, and still talking into microphones they probably shouldn’t be trus...