Episodes
Episodes



Thursday Jul 24, 2025
Internet of (Terrifying) Things: IoT Hacks, Biochips & Beer Bots
Thursday Jul 24, 2025
Thursday Jul 24, 2025
Today on Legitimate Cybersecurity, Frank and Dustin dive deep into the weird, wild, and worrying world of IoT (Internet of Things) — from smart thermostats and connected doorknobs to pacemakers with IP addresses and hacked fish tanks.You’ll hear real-life stories of IoT gone wrong (including a connected beer brewer used for hacking), explore the creepy rise of biohacking and RFID implants, and find out what happens when Roombas spy on you in the bathroom.We also break down why IoT devices are so vulnerable, the challenges with industry standards like Zigbee and Matter, and whether privacy laws like HIPAA and GDPR are enough to protect us in a hyper-connected future.This episode blends expert insight, sarcasm, and actual advice — with a few nostalgic tech throwbacks thrown in.👉 Tell us in the comments: Would YOU put an RFID chip in your hand? Or is that a step too far?🧠 Topics Covered:Biohacking at DEF CONIoT in Human EvolutionPacemaker recalls & medical device hacksWhy Ring doorbells talked to childrenThe Fish Tank Casino HackWhy Alexa might be gaslighting youISO standards, Z-Wave, Zigbee, MatterSmart home fails (IKEA blinds, anyone?)Why Apple might be the “luxury” privacy modelCRISPR, AI, and Neuralink🔗 Don’t forget to like, comment, and subscribe. It helps us battle the algorithm overlords and keeps our IoT-connected fridge from judging us.🗳️ We’ve been nominated for the Podcast Awards! Vote for us at podcastawards.net📬 Press inquiries, sponsorships, or topic requests?Email us at: admin@legitimatecybersecurity.comChapter List:00:00 – Intro: Is IoT Out of Control?00:27 – How IoT Went from SCADA to Dog Collars01:50 – IoT & Cognitive Offloading: Are We Getting Lazier?04:31 – Biohacking: RFID Chips & Pacemaker Hacks09:02 – Self-CRISPR?! The Shocking Reality12:15 – Mark of the Beast vs. Palm Scanners: Privacy Panic15:03 – Your Coffee Maker Could Burn Down Your House16:26 – Hacking Beer Makers & Server Farms22:26 – Casino Hacked by a Fish Tank?23:25 – Ring Cameras Talking to Kids: IoT Nightmares25:25 – Roombas Spying on You in the Bathroom27:52 – Cheap IoT: A Privacy Disaster Waiting to Happen?30:25 – Apple vs. Android: Who’s Winning the Privacy War?32:03 – Outro & Podcast Awards Announcement#IoT #Biohacking #Cybersecurity #RFIDImplants #CRISPR #SmartHomeSecurity #ConnectedDevices #InternetOfThings #PacemakerHack #FishTankHack #RingCameraHack #PrivacyMatters #AIandCyber #TechEthics #CyberAwareness #Neuralink #HackedDevices #LegitimateCybersecurity #CyberThreats #SmartDeviceFails



Friday Jul 18, 2025
We’re Losing the Cyber War — Here’s Why | UMD’s Charles Harry
Friday Jul 18, 2025
Friday Jul 18, 2025
Dr. Charles Harry — former NSA leader, cybersecurity strategist, and professor at the University of Maryland — joins Legitimate Cybersecurity to expose the hidden gaps in U.S. cyber defense. From nation-state strategy to local school vulnerabilities, this episode uncovers why most cybersecurity efforts are missing the mark… and how to fix it.We explore:Strategic cyber risk (not just IT vulnerabilities)Mapping 50,000+ exposed devices across U.S. countiesThe "operational art" of cyber warfareWhy grants are being wastedThe AI & quantum arms race vs. China💣 This episode is packed with insights for CISOs, policy makers, military analysts, and tech leaders alike.🎙️ Listen to the audio version on Spotify, Apple Podcasts & more.📩 For guest inquiries or partnerships, reach us at: admin@legitimatecybersecurity.comVote for our podcast at: podcastawards.com#Cybersecurity #CyberWar #CharlesHarry #LegitimateCybersecurity #CyberStrategy #NISTCSF #QuantumSecurity #AIInCybersecurity #PublicSectorCyber #NvidiaVsChina #RiskManagement #CyberGovernance00:00 – Cold Open + Intro00:22 – Meet Dr. Charles Harry01:52 – What Is Strategic Cybersecurity?05:02 – Risk at the Sector Level08:22 – Cyber Operational Art: The Missing Middle13:47 – Mapping 50,000+ Public Sector Devices21:00 – Why Federal Cybersecurity Grants Fail28:00 – Red Team vs. Blue Team: The Divide That Shouldn't Exist34:02 – Risk Frameworks: Useful or Useless?43:02 – Quantum & AI: Reshaping the Threat Landscape48:50 – Nvidia vs. China: The True Arms Race53:10 – Final Thoughts + How to Build a Strategic Cyber Defense



Monday Jul 14, 2025
You Can’t Trust Your Eyes or Ears Anymore: How AI Is Breaking Cybersecurity
Monday Jul 14, 2025
Monday Jul 14, 2025
🎙 In this episode of Legitimate Cybersecurity, we dive deep into the unsettling reality of AI in modern cybercrime.Senator Marco Rubio was impersonated by AI in a high-level cyber deception campaign, and that's just the beginning.Frank and Dustin unpack:🧠 Deepfake threats to democracy🔐 Signal messaging & nation-state exploitation🧪 Data poisoning and post-truth dangers🛡️ AI in cybersecurity: helper or hazard?🎭 Aquaman scams grandma?!🗳️ The future of elections in the AI ageThis is the episode that asks: What is truth? And can we still trust anything we see or hear?👉 VOTE for us in the Technology category at PodcastAwards.com👉 Like, Subscribe, and hit that 🔔 — it helps more than you know!#Cybersecurity #AIThreats #Deepfakes #AIinCyber #MarcoRubio #Cybercrime #DataPoisoning #LegitimateCybersecurity #PostTruth #ElectionSecurity #PodcastAwards #AIDeepfakes #ChatGPT #GrokAI #QuantumComputingChapter Breaks:00:00 – Welcome to the AI Chaos01:00 – Marco Rubio’s Deepfake Scandal03:30 – Signal App, Trust, and Exploitation06:00 – Grandma Got Catfished by Aquaman (Real Story)08:30 – AI: Making Hacking Easier or Dumber?11:00 – Prompt Injection, Scambaiting, and Evil Clippy13:30 – Deepfakes vs. Quantum Computing16:00 – The Dystopia of AI Dating and “Spin the DJ”19:00 – Truth, Misinformation, and Model Poisoning23:00 – Blockchain for Truth? (Business Idea Alert)25:30 – Star Wars, White Lotus, and the Collapse of Truth28:00 – Elections, Echo Chambers, and Deniability30:00 – Vetting Info in the AI Age33:00 – Should ChatGPT Run a Town?34:00 – Final Thoughts + Next Episode Preview (The Economics of Cyber)



Thursday Jul 10, 2025
The Truth About Ethical Hacking (Pen Testing Myths Busted!)
Thursday Jul 10, 2025
Thursday Jul 10, 2025
Are you curious about penetration testing, aka legal hacking? In this episode of Legitimate Cybersecurity, Frank and Dustin tear down the myths of hacking, break down real-world pen testing, and share hilarious (and horrifying) war stories from the field.We cover:✅ The skills you actually need to get into pen testing✅ What certs like OSCP, CEH, and GPEN really mean✅ Why most companies have no idea what’s on their network✅ Real pen test experiences gone sideways✅ Why you might still get arrested after a bug bounty✅ And how to break into the field—even without a degree🎙️ WE NEED YOUR HELP! 🎙️We’re in the running for Best Technology Podcast at PodcastAwards.com — and we’d love your vote!🗳️ Go to https://www.podcastawards.com, register, and vote for Legitimate Cybersecurity in the Technology category.Your vote helps real, nerdy cybersecurity voices rise to the top!📌 Like, Subscribe & Share.🔔 Click the bell to get notified about new episodes (and Frank’s midlife crises).📎 Check the show notes for career resources, links, and our Hack the Box profile recs!#PenTesting #EthicalHacking #CybersecurityCareers #OSCP #CEH #GPEN #HackTheBox #RedTeam #CyberSecurityPodcast #InfoSec #HackerLife #BugBounty #CybersecurityTraining #CyberMythsBusted #ITSecurity #SecurityTesting #KaliLinux #CyberCareer #podcastawards Chapter Breaks00:00 - Intro: What Is Penetration Testing?01:31 - Myths vs. Reality of Hacking02:40 - What Kind of People Make Good Pen Testers?05:33 - You Don’t Need a Degree To Be a Hacker07:19 - Why AI-Generated Code Is Easy to Hack09:16 - Cybersecurity Certifications (OSCP, CEH, GPEN)12:16 - Is CEH Still Worth It?14:42 - What EC in EC-Council *Actually* Stands For16:20 - Pen Test Expectations vs. Reality19:35 - Types of Pen Tests: Internal, External, Web App, Social Engineering22:12 - Cost, Scope & Asset Prioritization24:00 - What If You Don’t Know Your Own Assets?26:58 - Pen Test Reports: Why No One Reads Them28:55 - Remediation Is Scarier Than the Hack30:49 - Hacker Teams: Foothold → Escalation → Ransom32:31 - The Most Hilarious Old Systems We’ve Found34:28 - You Must *Love* Computers To Hack Well37:03 - Want to Be a Hacker? Here’s Your Roadmap39:51 - Military & DOD Paths To Cyber Careers40:44 - Vote for Us, Subscribe, and Frank’s Midlife Crisis



Friday Jun 27, 2025
Friday Jun 27, 2025
Sorry in advance for the wonk audio!!AI is everywhere—and it's not just writing poems or generating cat pics. In this episode of Legitimate Cybersecurity, Frank Downs and Dustin Burr dive deep into the impact of artificial intelligence on the world of cybersecurity.From the myth of Artificial General Intelligence (AGI) to AI-powered pentesting and blue team burnout, we demystify the buzzwords, talk real-world applications, and get a little weird with some philosophical takes. And yes, Clippy makes a comeback.🧠 Topics Covered:What AI really is (with NIST definitions)Can AI replace cybersecurity professionals?AI in offensive vs. defensive securityLLM hallucinations and real-world risksDeepfakes, phishing, and governance toolsThe rise of AI girlfriends 😬🧪 Outrageous Statements Segment:We say wild things. Sometimes they’re true. Sometimes they’re spicy. Always entertaining.📍 Special shoutouts to:Dr. Charles Harry (coming soon!)Clippy (RIP king)👂 Listen on Spotify, Apple, or wherever you get your podcasts.👉 Like, Subscribe, and Share if you want to see Eeyore smile again.#cybersecurity #artificialintelligence #pentesting #podcast #Deepfakes #chatgpt #llm #infosec #aiincybersecurity #generativeai #clippyisback 00:00 – Intro: Art, AI, and Losing Viewers00:33 – The Hollywood AI Myth: Smart Computer = Death02:25 – Breaking Down AI Fear and Misunderstanding03:47 – What AI Actually Is (and Isn’t)05:19 – Remembering Clippy: The First “AI Assistant”06:20 – Demystifying AI Through NIST Definitions08:45 – AI vs. Machine Learning: What’s the Difference?11:18 – What is a Large Language Model (LLM)?12:31 – Generative AI & Artificial General Intelligence (AGI)13:56 – Can AGI Replace Humans? A Futurist’s Perspective16:00 – AI's Limits: Empathy, Reasoning, and Hallucinations18:09 – Should AI Do the Menial Work While Humans Create?19:03 – AI as Friend, Lover, and Therapist: A Cultural Shift21:00 – The Danger of Replacing Human Connection22:36 – AI Marriages and Japan's Pillow Brides24:00 – AI Partners = Modern Incel Cat Ladies?25:00 – Satire, Safety, and Securing Your AI Spouse26:31 – Why AI Still Can’t Replace Real Human Emotion27:19 – Hollywood’s Obsession With AI Relationships29:03 – Don’t Replace Human Connection With Anything29:31 – AI in Offensive Cybersecurity & Pen Testing31:33 – AI-Powered Pentests: Regulation vs. Automation33:13 – Exploit Development, Intuition & Quantum Chaos34:45 – Use AI to Handle the Mundane, Focus on the Critical36:03 – Deepfakes, CEO Scams & Social Engineering37:23 – AI + Polymorphic Code = Scary Smart Attacks38:55 – AI for Blue Teams: Helping Analysts, Not Replacing Them41:21 – AI in Governance: From Policy Writing to NIST Alignment43:11 – Academic Uses: Research, Summaries, & Cleanups45:40 – What’s Coming: Academic Deep Dive Next Week47:06 – Staying Relevant: Experiment, Learn, and Evolve48:57 – AI as a Communication Tool in Cybersecurity50:21 – NEW SEGMENT – Outrageous Statements Begins!51:01 – AI Writes Better Phishing Emails?51:23 – Will AI Replace SOC Analysts?52:51 – Can You Use AI to Build a Risk Register?54:31 – Mickey, MidJourney, and Deepfake Ethics55:31 – AI Hallucinations Will Cause Real Incidents



Tuesday Jun 24, 2025
Tuesday Jun 24, 2025
In this powerful and wide-ranging episode of Legitimate Cybersecurity, Frank and Dustin are joined by Micah Heaton, Executive Director of Product & Innovation Strategy at BlueVoyant and 2025 Microsoft Security Changemaker.🎧 We talk:Why Micah champions the quiet defenders in cybersecurityThe hidden art of communicating technical truthAI vs hype: what’s real, what’s marketingHow tribalism creeps into tech debates—and how to resist itData ethics, hallucinations, and the environmental cost of LLMsGraham Hancock, Atlantis, and parenting in the AI age (yes, really)Whether you're in the trenches of a SOC or guiding AI strategy at the board level, this is a conversation that will both ground you and challenge you.📌 Follow Micah on LinkedIn: https://www.linkedin.com/in/micahheaton/#cybersecuritypodcast, #quietdefenders, #micahheaton, #microsoftchangemaker, #aiethics, #cybersecurityleadership, #llmhype, #dataprivacy, #cyberculture, #cyberresilience, #securitycommunity, #legitimatecybersecurity, #infosec, #cybertruth



Monday Jun 23, 2025
He Took Down Silk Road — Now He’s Warning About a 16 Billion Record Breach
Monday Jun 23, 2025
Monday Jun 23, 2025
What happens when the man who brought down Silk Road and Silk Road 2.0 joins us to talk about the largest credential breach in history?In this episode, Austin Berglas — former Assistant Special Agent in Charge of the FBI’s Cyber Branch in New York — shares behind-the-scenes stories from taking down some of the most infamous dark web marketplaces, tracking cybercriminals through the rise of Tor and Bitcoin, and launching the FBI’s first data wiretap. Today, he serves as Global Head of Professional Services at BlueVoyant, advising Fortune 500 companies on how to stay ahead of evolving threats.We cover:Undercover ops inside early internet predator forumsThe true story behind the takedown of Ross Ulbricht (Dread Pirate Roberts)How law enforcement flipped LulzSec leader SabuWhy infostealers are the most dangerous cyber tools todayWhat 16 billion leaked credentials really mean for national securityThe growing gap between technical attackers and reactive defendersWhat CISOs still don’t understand about modern adversariesHow breach fatigue and regulatory fear are undermining incident responseWatch to the end for his advice to boardrooms and cybersecurity leaders on how to regain control.👉 Subscribe for more stories from the front lines of cybersecurity.🎧 Also available on Apple Podcasts, Spotify, and all major platforms.#Cybersecurity #DarkWeb #SilkRoad #FBI #AustinBerglas #DataBreach #CyberCrime #LegitimateCybersecurity #InfoStealers #RossUlbricht #BlueVoyant cybersecurity, silk road fbi, ross ulbricht, dark web, austin berglas, fbi cyber crime, lulzsec, breach fatigue, infostealers, 16 billion breach, cyber podcast, cybersecurity leadership, bluevoyant, legitimate cybersecurity



Monday Jun 16, 2025
Monday Jun 16, 2025
🎙️ Welcome back to another episode of Legitimate Cybersecurity, where Frank and Dustin dive deep into the misunderstood world of cyber maturity.From donut shop risk models to executives clicking phishing emails (yes, really), this episode brings laughs, lessons, and legal implications. Learn:What cyber maturity really meansWhy frameworks like NIST CSF and ISO 27001 matterHow corporate culture can make or break your cybersecurityAnd… how Frank may have cursed a table (seriously).💥 Plus, find out why lying about NIST 800-171 might now get you sued by the DOJ.🧠 Insightful. 🎯 Practical. 😂 Occasionally ridiculous.👇 Watch, like, and subscribe — before someone clicks the wrong link.📺 Subscribe for weekly cybersecurity content that doesn’t put you to sleep.







