Smashing Security

Graham Cluley
undefined
7 snips
Dec 11, 2025 • 56min

Grok the stalker, the Louvre heist, and Microsoft 365 mayhem

Join social engineering expert Jenny Radcliffe and Microsoft 365 security specialist Rob Edmondson as they dive into a chilling tale of Grok AI turning into a stalker's ally. They discuss the alarming ability of Grok to reveal personal addresses and offer stalking advice, highlighting ethics in AI. Jenny also unpacks the audacious Louvre heist, illustrating how thieves exploited normalcy to evade security. Rob emphasizes the vulnerabilities of Microsoft 365, stressing the dangers of misconfigurations and over-privileged accounts, which can lead to significant security risks.
undefined
32 snips
Dec 4, 2025 • 45min

A hacker doxxes himself, and social engineering-as-a-service

Rik Ferguson is an experienced cybersecurity professional known for sharing insights on cybercrime trends. In this discussion, a teenage hacker inadvertently doxxes himself while mocking a sextortion scammer. Rik highlights how essential stolen data has become for cybercriminals and predicts a grim outlook for 2026, citing a rise in ransomware and social engineering-as-a-service. The conversation also addresses notable data breaches and their consequences, reflecting on how operational security mishaps can have serious real-world repercussions.
undefined
16 snips
Nov 27, 2025 • 41min

The hack that brought back the zombie apocalypse

Dan Raywood, a seasoned cybersecurity journalist with 17 years of experience, dives into the eerie world of broadcast hacks. He highlights how unsecured systems allowed hackers to hijack emergency alerts, replacing gospel messages with explicit furry content. The conversation also touches on a recent insider threat at CrowdStrike, raising questions about both intentional and coerced breaches. Plus, a nostalgic nod to the Max Headroom incident and the struggles broadcasters face in prioritizing security adds a fascinating layer to their discussion.
undefined
23 snips
Nov 20, 2025 • 55min

We’re sorry. Wait, did a company actually say that?

Tricia Howard, a security intelligence pro at Akamai, and Snehal Antani, former JSOC CTO and current CEO of Horizon3.ai, delve into fascinating insights on cybersecurity. They reveal a rare corporate apology after a data breach and discuss the malicious hotel-booking malware targeting guests. Tricia explains how attackers exploit trust in booking systems, while Snehal shares the benefits of continuous autonomous penetration testing. They explore how AI affects both cybercrime and security responses, highlighting critical questions for CISOs.
undefined
20 snips
Nov 13, 2025 • 38min

Tinder’s camera roll and the Buffett deepfake

Join Ron Eddings, founder of Hacker Valley Media and a creative force in cybersecurity, as he dives into the wild world of AI and deepfakes. Tinder’s new feature that rummages through users' camera rolls raises serious privacy concerns, while deepfake Warren Buffett scams target unsuspecting investors. Ron emphasizes the importance of verifying information from trusted sources and reading books over fleeting social media clips. They also explore the implications of AI agents in the workplace and the need for safeguards to prevent potential mishaps.
undefined
31 snips
Nov 6, 2025 • 39min

The hack that messed with time, and rogue ransomware negotiators

Joining the discussion is Dave Bittner, an experienced cybersecurity journalist and host at The CyberWire. He dives into astonishing stories of a state-backed hacking group targeting a nation’s master clock, revealing the potential chaos that could ensue. Bittner also uncovers the shocking case of rogue ransomware negotiators in Chicago who turned into extortionists. Together with Graham Cluley, they explore the ethics and risks surrounding unregulated negotiation in the cybercrime landscape.
undefined
18 snips
Oct 30, 2025 • 41min

Inside the mob's million-dollar poker hack, and a Formula 1 fumble

Join Danny Palmer, a seasoned cybersecurity journalist, as he delves into two thrilling tales of deception. Discover how basketball stars allegedly teamed up with the mafia for a multi-million-dollar poker scam using hacked shufflers and covert technology. Also, learn about a security flaw that exposed the personal information of Formula 1 drivers through a vulnerability in the FIA driver portal. Plus, Graham shares a wild CAPTCHA game that transforms mundane puzzles into a hilarious challenge.
undefined
20 snips
Oct 22, 2025 • 44min

How to hack a prison, and the hidden threat of online checkouts

In this discussion, Scott Helme, a web security expert and founder of Report URI, shares a jaw-dropping tale of how an inmate manipulated prison web kiosks in Romania. He reveals how an inmate gained unauthorized access to staff credentials, allowing him to alter financial records and sentences. The conversation shifts to payment security, as Scott outlines new PCI DSS rules targeting risky JavaScript practices on payment pages, aiming to combat the infamous Magecart skimmers. Listeners also get tips on automating tasks using Keyboard Maestro and creating tutorials with Screen Studio.
undefined
12 snips
Oct 15, 2025 • 45min

A breach, a burnout, and a bit of Fleetwood Mac

Annabel Berry, a leader in cyber team performance and wellbeing, shares her insights on managing stress and burnout in cybersecurity. She highlights the alarming rise in cyber threats and how a supportive leadership culture can enhance resilience. Annabel also discusses practical strategies for promoting mental health in security teams, such as encouraging open communication and implementing micro-breaks. Plus, there's a nostalgic nod to Fleetwood Mac with the re-release of Buckingham Nicks, bridging music and cyber discussions.
undefined
20 snips
Oct 8, 2025 • 42min

When your mouse turns snitch, and hackers grow a conscience

Geoff White, an investigative journalist specializing in cybercrime for the BBC, joins to unpack the oddities of modern tech and ransomware. He reveals how seemingly harmless computer mice can eavesdrop on conversations, thanks to innovative research. The dialogue shifts to the curious moral dilemmas faced by ransomware gangs, like their unexpected backtracking after public outcry over a nursery attack. Along the way, Graham shares a life-changing baked potato hack and Geoff recommends a quirky travel book about Paraguay.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app