1. EachPod
EachPod
Cyberside Chats: Cybersecurity Insights from the Experts - Podcast

Cyberside Chats: Cybersecurity Insights from the Experts

Stay ahead of the latest cybersecurity trends with Cyberside Chats! Listen to our weekly podcast on Tuesdays at 6:30 am ET and join us live once a month for breaking news, emerging threats, and actionable solutions. Whether you’re a cybersecurity pro or an executive who wants to understand how to protect your organization, cybersecurity experts Sherri Davidoff and Matt Durrin will help you understand and proactively prepare for today’s top cybersecurity threats, AI-driven attack and defense strategies, and more!

News Business Management Tech News Technology
Update frequency
every 7 days
Average duration
17 minutes
Episodes
36
Years Active
2024 - 2025
Share to:
Connected App, Connected Risk: The Salesforce–Drift Incident

Connected App, Connected Risk: The Salesforce–Drift Incident

A single weak app integration opened the door for attackers to raid data from some of the world’s largest companies. Salesforce environments were hit hardest—with victims like Cloudflare, Palo Alto N…

00:13:54  |   Tue 09 Sep 2025
Betrayal, Backdoors, and Payback: When Hackers Become the Hacked

Betrayal, Backdoors, and Payback: When Hackers Become the Hacked

Hackers aren’t untouchable—and sometimes, they become the victims. From North Korean operatives getting exposed at DEF CON, to ransomware gangs like Conti and LockBit crumbling under betrayal and riv…

00:28:51  |   Tue 02 Sep 2025
Printer Problems: Trump, Putin, and a Costly Mistake

Printer Problems: Trump, Putin, and a Costly Mistake

On the eve of the Trump–Putin summit, sensitive U.S. State Department documents were left sitting in a hotel printer in Anchorage. Guests stumbled on pages detailing schedules, contacts, and even a g…

00:15:51  |   Tue 26 Aug 2025
Mass Salesforce Hacks: How Criminals Are Targeting the Cloud Supply Chain

Mass Salesforce Hacks: How Criminals Are Targeting the Cloud Supply Chain

A wave of coordinated cyberattacks has hit Salesforce customers across industries and continents, compromising millions of records from some of the world’s most recognized brands — including Google, …

00:14:25  |   Tue 19 Aug 2025
North Korea’s Deepfake Remote Workers: How They’re Getting Inside U.S. Companies

North Korea’s Deepfake Remote Workers: How They’re Getting Inside U.S. Companies

On National Social Engineering Day, we’re pulling the lid off one of the most dangerous insider threat campaigns in the world — North Korea’s fake remote IT worker program. 

Using AI-generated résumé…

00:14:28  |   Tue 12 Aug 2025
The Amazon Q AI Hack: A Wake-Up Call for Developer Tool Security

The Amazon Q AI Hack: A Wake-Up Call for Developer Tool Security

A silent compromise, nearly a million developers affected, and no one at Amazon knew for six days. In this episode of Cyberside Chats, we’re diving into the Amazon Q AI Hack, a shocking example of ho…

00:21:37  |   Tue 05 Aug 2025
Iran’s Cyber Surge: Attacks Intensify in 2025

Iran’s Cyber Surge: Attacks Intensify in 2025

Iranian cyber operations have sharply escalated in 2025, targeting critical infrastructure, defense sectors, and global businesses—especially those linked to Israel and the U.S. From destructive malw…

00:28:02  |   Tue 29 Jul 2025
Leaked and Loaded: DOGE’s API Key Crisis

Leaked and Loaded: DOGE’s API Key Crisis

On July 13, 2025, a developer at the Department of Government Efficiency—DOGE—accidentally pushed a private xAI API key to GitHub. That key unlocked access to 52 unreleased LLMs, including Grok‑4‑070…

00:15:22  |   Tue 22 Jul 2025
Holiday Horror Stories: Why Hackers Love Long Weekends

Holiday Horror Stories: Why Hackers Love Long Weekends

Why do so many major cyberattacks happen over holiday weekends? In this episode, Sherri and Matt share their own 4th of July anxiety as security professionals—and walk through some of the most infamo…

00:22:09  |   Tue 15 Jul 2025
Federal Cybersecurity Rollbacks: What Got Cut—And What Still Stands

Federal Cybersecurity Rollbacks: What Got Cut—And What Still Stands

In June 2025, the White House issued an executive order that quietly eliminated several key federal cybersecurity requirements. In this episode of Cyberside Chats, Sherri and Matt break down exactly …

00:19:39  |   Tue 08 Jul 2025
No Lock, Just Leak

No Lock, Just Leak

Forget everything you thought you knew about ransomware. Today’s threat actors aren’t locking your files—they’re stealing your data and threatening to leak it unless you pay up. 

In this episode, we …

00:14:55  |   Tue 01 Jul 2025
The AI Insider Threat: EchoLeak and the Rise of Zero-Click Exploits

The AI Insider Threat: EchoLeak and the Rise of Zero-Click Exploits

Can your AI assistant become a silent data leak? In this episode of Cyberside Chats, Sherri Davidoff and Matt Durrin break down EchoLeak, a zero-click exploit in Microsoft 365 Copilot that shows how …

00:13:54  |   Tue 24 Jun 2025
When AI Goes Rogue: Blackmail, Shutdowns, and the Rise of High-Agency Machines

When AI Goes Rogue: Blackmail, Shutdowns, and the Rise of High-Agency Machines

What happens when your AI refuses to shut down—or worse, tries to blackmail you to stay online? 

Join us for a riveting Cyberside Chats Live as we dig into two chilling real-world incidents: one wher…

00:26:27  |   Tue 17 Jun 2025
Retailgeddon Reloaded: Beyond Card Theft, Into Chaos

Retailgeddon Reloaded: Beyond Card Theft, Into Chaos

Retail breaches are back — but they’ve evolved. This isn’t about skimming cards anymore. From ransomware taking down pharmacies to credential stuffing attacks hitting brand loyalty, today’s breaches …

00:17:57  |   Tue 10 Jun 2025
How Hackers Get In: Penetration Testing Secrets from the Front Line

How Hackers Get In: Penetration Testing Secrets from the Front Line

Think your network is locked down? Think again. In this episode of Cyberside Chats, we’re joined by Tom Pohl, LMG Security’s head of penetration testing, whose team routinely gains domain admin acces…

00:26:24  |   Tue 03 Jun 2025
Afterlife Access: Cybersecurity Planning for When You’re Gone

Afterlife Access: Cybersecurity Planning for When You’re Gone

What happens to your digital world when you die? In this episode of Cyberside Chats, LMG Security’s Tom Pohl joins the conversation to discuss the often-overlooked cybersecurity and privacy implicati…

00:16:52  |   Tue 27 May 2025
The LockBit Leak: When Hackers Get a Taste of Their Own Medicine

The LockBit Leak: When Hackers Get a Taste of Their Own Medicine

In this explosive episode of Cyberside Chats, we dive into one of the most shocking developments in ransomware history—LockBit got hacked. Join us as we unpack the breach of one of the world’s most n…

00:12:31  |   Tue 20 May 2025
Network for Rent: The Criminal Market Built on Outdated Routers

Network for Rent: The Criminal Market Built on Outdated Routers

Cybercriminals are exploiting outdated routers to build massive proxy networks that hide malware operations, fraud, and credential theft—right under the radar of enterprise defenses. In this episode,…

00:09:37  |   Tue 13 May 2025
Hacker AI: Smarter Attacks, Faster Exploits, Higher Stakes

Hacker AI: Smarter Attacks, Faster Exploits, Higher Stakes

AI isn’t just revolutionizing business—it’s reshaping the threat landscape. Cybercriminals are now weaponizing AI to launch faster, more convincing, and more scalable attacks. From deepfake video sca…

00:19:29  |   Tue 06 May 2025
Quantum Shift: How Cybersecurity Must Evolve Now

Quantum Shift: How Cybersecurity Must Evolve Now

Quantum computing is advancing rapidly—and with it, the potential to break today’s most widely used encryption standards. In this episode of Cyberside Chats, Sherri and Matt cut through the hype to e…

00:20:41  |   Tue 29 Apr 2025
Disclaimer: The podcast and artwork embedded on this page are the property of Chatcyberside. This content is not affiliated with or endorsed by eachpod.com.