Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Blog Pricing
Podcast Image

Legitimate Cybersecurity Podcasts

Technology

Episodes

A $29 Tracker Could Be Following You Right Now

08 May 2026

Contributed by Lukas

One could be hidden in your car, purse, luggage, or jacket — and it may cost less than dinner. Bluetooth trackers were built to find lost keys, but...

An Aquarium Hacked A Casino. Your House Is Next

04 May 2026

Contributed by Lukas

Gloria Globman — CTO of Acclaimed Technical Services, former Senior Cyber Advisor at the US Embassy in Tokyo, US Navy veteran, and Presidential Rank...

AI Is Now Faking Loved Ones and Setting Prices

27 Apr 2026

Contributed by Lukas

AI is no longer just answering prompts — it is imitating dead relatives, profiling shoppers, and helping companies decide what people pay. That mat...

Can AI Agents Actually Hack Systems?

18 Apr 2026

Contributed by Lukas

A new AI is being framed as a tool that can find zero-days fast and even “hack its way out” of containment. If that claim is real, defenders, dev...

Why Is LinkedIn Spying on Your Browser?

10 Apr 2026

Contributed by Lukas

A new lawsuit alleges LinkedIn may have been collecting data from inside users’ browsers in ways most people never expected. If that is true, this ...

What’s Inside the White House App?

04 Apr 2026

Contributed by Lukas

You expect a government app to inform you. You probably do not expect tracking capability, mystery dependencies, and sloppy security decisions. This ...

AI Is Already in Your Tools. No One Wrote the Rules

01 Apr 2026

Contributed by Lukas

AI is being forced into the tools you use every day before most companies have written real rules. That matters because one careless prompt can becom...

AI Is Replacing Tech Jobs With Insecure Code

20 Mar 2026

Contributed by Lukas

AI is starting to replace parts of white-collar work faster than most people realize. The bigger problem is that it may also flood the market with in...

Your TV Is Recording What You Watch

13 Mar 2026

Contributed by Lukas

Your smart TV may be taking snapshots of what you watch, even when you think you bypassed the built-in apps. That data can be used to identify show...

After the Breach, the Legal Crisis Begins

07 Mar 2026

Contributed by Lukas

A cyber incident is not just a technical problem. The legal response can shape what happens next, what gets disclosed, and how much worse the damage b...

The FBI Isn’t Your Cyber Defense Anymore (It’s Privatized Now)

03 Mar 2026

Contributed by Lukas

America’s cyber “first responder” isn’t the FBI anymore—it’s private companies. That shift changes what gets prioritized during a breach:...

AI Is Rewriting Compliance (GRC)

23 Feb 2026

Contributed by Lukas

Compliance isn’t “paperwork”—it’s the last line between your customers and the next Equifax-level mess. But GRC teams are stuck chasing scr...

Your Doorbell Camera Is Quietly Building a Surveillance Database

19 Feb 2026

Contributed by Lukas

You bought a security camera… but what you actually bought was a cloud evidence locker. And when you hit “delete,” it might only mean you lose ...

AI Agents Are Malware Now (And We’re Installing Them)

15 Feb 2026

Contributed by Lukas

AI agents aren’t just “tools” anymore — they’re getting delegated access, running workflows, calling APIs, and making decisions inside your ...

This Surveillance Network Is Spreading Quietly—And You Can’t Opt Out

11 Feb 2026

Contributed by Lukas

You can be tracked in the real world—without consent—just by driving down a public road. And the scariest part isn’t “live tracking”… i...

Your AI Agents Need Logins (Or They’ll Burn Your Company Down)

09 Feb 2026

Contributed by Lukas

AI is pushing security into a new failure mode: tools that don’t just talk… they act. If you don’t treat AI agents like identities—with guard...

Stop Saying You Have Nothing to Hide! It’s Costing You Money!

02 Feb 2026

Contributed by Lukas

The "I have nothing to hide" argument is dead. It’s not about secrecy anymore—it’s about your wallet. Most people assume data collection is j...

The TikTok ”Sale” is a Lie: Why the Algorithm remains the Threat

23 Jan 2026

Contributed by Lukas

Everyone thinks the TikTok problem is solved because "US Data stays in the US." That is a dangerous misunderstanding of how the technology works. I...

The Tools Cyber Pros Use To Monitor You!

19 Jan 2026

Contributed by Lukas

Your work laptop isn’t yours — and one legal issue inside your company can put your logins, browsing, and messages under review. We break down th...

AI is Hacking Your Brain! The Truth about Digital Affairs!

10 Jan 2026

Contributed by Lukas

AI can sound empathetic, supportive, even “therapeutic”—but it can’t be accountable. That gap matters most when someone is isolated, vulnerab...

AI Is Rebuilding the Dead — With Your Data

28 Dec 2025

Contributed by Lukas

Your body dies — but your accounts don’t. And now AI can be trained on the dead. So who “owns” your digital afterlife… and who gets to use ...

5 Holiday Scams That Drain Your Money Fast (Gift Cards, Texts, QR)

19 Dec 2025

Contributed by Lukas

Your gift card can be empty before you even buy it—and that’s just one of the holiday scams exploding right now. In December, attackers don’t n...

Your Phone, Your Car, Your Movies—You Don’t Actually Own ANY of It #cybersecurity

12 Dec 2025

Contributed by Lukas

Your smartphone, your streaming library, even your tractor—none of them actually belong to you. Companies can lock you out, delete your data, revoke...

Why Security Tools Are Designed To Fail (VP Revelations) #cybersecurity

05 Dec 2025

Contributed by Lukas

The cybersecurity industry is gaslighting you. We spend billions on dashboards that look pretty but act like "sleep paralysis demons" for the analysts...

The Drone Privacy Crisis: What No One Is Telling You. #cybersecurity

28 Nov 2025

Contributed by Lukas

Drones are showing up where they shouldn’t — over backyards, pools, windows, driveways, campsites, neighborhoods, and even over insurance customer...

SIM Swapping Is Back — And They Can Steal Your Phone Without Touching It #cybersecurity

21 Nov 2025

Contributed by Lukas

SIM swapping has returned — and the attackers have leveled up. In this episode, Frank, Dustin, and returning guest Chris Adkins break down how moder...

AI vs Religion: The Vatican Breaks Its Silence — And It’s Terrifying #cybersecurity

16 Nov 2025

Contributed by Lukas

The Vatican just issued a massive warning about AI — and it might be the most unexpected twist in the religion-tech debate yet. Frank and Dustin div...

Leonardo da Vinci Had Better Wi-Fi: The $100M Louvre Heist #cybersecurity

10 Nov 2025

Contributed by Lukas

What happens when the most secure museum on Earth has a Wi-Fi password that’s literally “louvre”? 💎 $100 million in jewels disappear, and ...

Haunted Networks: Possessed Printers, Phantom Texts, and the OG Computer ‘Bug’ #cybersecurity

31 Oct 2025

Contributed by Lukas

Tonight’s Halloween special gets deliciously weird. 🦇 Dustin and Frank unpack four true tech “hauntings”: • The Ghost in the Printer—Why...

AI Is Quietly Killing Entry-Level Jobs (And No One Wants To Admit It)

28 Oct 2025

Contributed by Lukas

Are we watching the ladder get pulled up? A new Harvard-linked analysis shows companies that adopt generative AI hire 7.7% fewer junior roles — a su...

The Day the Cloud Died: How One Outage Broke Everything

22 Oct 2025

Contributed by Lukas

What happens when ONE “cloud” hiccup in Virginia slams the brakes on your life—smart beds trap sleepers, Alexa goes dumb, Venmo sputters, and en...

AI Is Spying on You: Zero-Touch Hacks, Secret Data Leaks, and the “No Legal Privilege” Bombshell

17 Oct 2025

Contributed by Lukas

Your AI assistant is helpful… until it isn’t. In this episode, Frank and Dustin break down the zero-touch exploits (EchoLeak & ShadowLeak) tha...

AI Won’t Save You: James Gustafson on Junior Talent, Button-ology, and Real Risk Reduction

11 Oct 2025

Contributed by Lukas

Why train when you can just hire?” In this episode, BlueVoyant Senior Vulnerability & Risk Analyst James Gustafson explains why that mindset—a...

Shadow Credit Bureau Exposed: How LexisNexis Tracks Your Every Move (Even Roller Coasters!)

06 Oct 2025

Contributed by Lukas

What if your “credit score” wasn’t the full story? Frank and Dr. Dustin uncover LexisNexis, the massive data broker quietly collecting everythi...

Reddit’s Spiciest Cyber FAQs—Board Risk, Automation Fails, Pay Cuts & “Cyber Sucks”

29 Sep 2025

Contributed by Lukas

Dr. Dustin Brewer just passed his dissertation defense (👑 incoming), so we celebrated the only way we know how: by tackling Reddit’s most controv...

From US Intelligence to DoD Cyber Ops: Frank & Dustin’s Origin Stories in Cybersecurity

22 Sep 2025

Contributed by Lukas

Why should you listen to us? Honestly—you shouldn’t. But if you do, know this: we’re not just two jokers talking theory. In this episode of L...

Secret Algorithms Controlling You! Are You the User… or the Product?

12 Sep 2025

Contributed by Lukas

Are algorithms helping—or handling—you? Frank and Dustin dive into how recommender systems, data brokers, and AI-powered platforms shape your news...

From Submarines to Cybersecurity: Chris Adkins’ Wild Journey Into Cyber Defense

05 Sep 2025

Contributed by Lukas

What do submarines, Linux servers, Apple X Servers, and SOC analysts all have in common? They were all part of Chris Adkins’ path into cybersecurity...

He Helped Take Down the Dark Web (Twice) — Vincent D’Agostino on DFIR, FBI & Real-World Cyber

25 Aug 2025

Contributed by Lukas

Former FBI agent and attorney Vincent “Vinnie” D’Agostino (now Head of Digital Forensics & Incident Response at BlueVoyant) joins us to unpa...

ChatGPT-5: Smarter Hackers, Dumber Defenders?

18 Aug 2025

Contributed by Lukas

ChatGPT-5 is here — but is it really the leap forward everyone’s claiming? In this episode of Legitimate Cybersecurity, Frank and Dustin break dow...

From Recon to Wrecked: The Cyber Kill Chain Breakdown (With Laughs)

12 Aug 2025

Contributed by Lukas

What if you could break down every cyberattack into just 7 steps? In this episode of Legitimate Cybersecurity, Frank and Dustin dive deep into the Cy...

Quantum Day is Coming: Will Quantum Computing Break Cybersecurity?

04 Aug 2025

Contributed by Lukas

Quantum computing is no longer science fiction—it’s a ticking clock for modern encryption. In this episode of Legitimate Cybersecurity, Frank and ...

Internet of (Terrifying) Things: IoT Hacks, Biochips & Beer Bots

24 Jul 2025

Contributed by Lukas

Today on Legitimate Cybersecurity, Frank and Dustin dive deep into the weird, wild, and worrying world of IoT (Internet of Things) — from smart ther...

We’re Losing the Cyber War — Here’s Why | UMD’s Charles Harry

18 Jul 2025

Contributed by Lukas

Dr. Charles Harry — former NSA leader, cybersecurity strategist, and professor at the University of Maryland — joins Legitimate Cybersecurity to e...

You Can’t Trust Your Eyes or Ears Anymore: How AI Is Breaking Cybersecurity

14 Jul 2025

Contributed by Lukas

🎙 In this episode of Legitimate Cybersecurity, we dive deep into the unsettling reality of AI in modern cybercrime. Senator Marco Rubio was impers...

The Truth About Ethical Hacking (Pen Testing Myths Busted!)

10 Jul 2025

Contributed by Lukas

Are you curious about penetration testing, aka legal hacking? In this episode of Legitimate Cybersecurity, Frank and Dustin tear down the myths of hac...

AI Can Write a Better Phishing Email Than You. Here’s Why That Should Terrify You

28 Jun 2025

Contributed by Lukas

Sorry in advance for the wonk audio!! AI is everywhere—and it's not just writing poems or generating cat pics. In this episode of Legitimate Cybe...

Quiet Defenders & Cyber Truths: Micah Heaton on AI, Advocacy, and Real-World Security

24 Jun 2025

Contributed by Lukas

In this powerful and wide-ranging episode of Legitimate Cybersecurity, Frank and Dustin are joined by Micah Heaton, Executive Director of Product &amp...

He Took Down Silk Road — Now He’s Warning About a 16 Billion Record Breach

23 Jun 2025

Contributed by Lukas

What happens when the man who brought down Silk Road and Silk Road 2.0 joins us to talk about the largest credential breach in history? In this epi...

Cyber Maturity Isn’t What You Think — Here’s the Real Truth (and a Few Ghost Tables)

16 Jun 2025

Contributed by Lukas

🎙️ Welcome back to another episode of Legitimate Cybersecurity, where Frank and Dustin dive deep into the misunderstood world of cyber maturity. ...

Cyber Never Sleeps (and Neither Do We): Frameworks, Failures & the Fight for Digital Resilience

21 May 2025

Contributed by Lukas

In this conversation, Frank and Dustin explore the critical themes surrounding cybersecurity, including its impact on businesses, the vulnerabilities ...

Cybersecurity, Dishwashers, and AI Threats: Welcome Back!

13 May 2025

Contributed by Lukas

After a three-year hiatus, Frank Downs and Dustin Brewer are back—older, wiser, and still talking into microphones they probably shouldn’t be trus...