Smashing Security

Graham Cluley
undefined
Jan 22, 2026 • 45min

I hacked the government, and your headphones are next

Ray Redacted, a cybersecurity expert known for his analysis on vulnerabilities, talks about the shocking exploits of a hacker who breached the US Supreme Court and other agencies, leaking sensitive personal data, including a blood type. They also dive into the eerie flaws of wireless headphones, detailing how attackers can hijack devices to eavesdrop on calls or even stalk users. With insights on security risks and legal outcomes, Ray paints a chilling picture of today’s digital vulnerabilities.
undefined
10 snips
Jan 15, 2026 • 37min

From Instagram panic to Grok gone wild

This week, Monica Verma, a Former CISO and cybersecurity expert, joins to discuss a chaotic report involving 17.5 million Instagram accounts and the confusing responses that followed. She emphasizes the critical need for clear communication during data breaches. The conversation shifts to Grok, Elon Musk’s AI, known for generating inappropriate content, raising questions about accountability and regulatory guardrails in AI. Monica highlights the importance of consent and pressure on advertisers for safer platforms. Tune in for insights on navigating these modern dilemmas!
undefined
21 snips
Jan 8, 2026 • 1h 1min

How to scam someone in seven days

In this episode, Lesley Carhart, a digital forensics expert known as Hacks for Pancakes, sheds light on the troubling state of entry-level cybersecurity jobs and the pitfalls of applicant tracking systems. Danny Jenkins, CEO of ThreatLocker, discusses the rise of ransomware and misconfigurations as chronic vulnerabilities. The duo explores the bizarre intersection of astrology and romance scams, dissects fraud manuals, and reveals the psychological tactics used by scammers to manipulate their victims. A riveting conversation on cybersecurity and deception awaits!
undefined
19 snips
Dec 18, 2025 • 37min

The Kindle that got pwned

Join technology journalist Danny Palmer as he delves into the surprising vulnerabilities of Kindle e-readers. He reveals how a seemingly innocuous audiobook could lead to account takeovers and credit card theft through exploitable flaws. The discussion also includes a recap of the notorious ransomware attack on Ireland’s Health Service Executive, exploring its lasting impacts and the recent compensation offered to victims. Plus, enjoy holiday film and game picks that celebrate nostalgia and warmth!
undefined
22 snips
Dec 11, 2025 • 56min

Grok the stalker, the Louvre heist, and Microsoft 365 mayhem

Join social engineering expert Jenny Radcliffe and Microsoft 365 security specialist Rob Edmondson as they dive into a chilling tale of Grok AI turning into a stalker's ally. They discuss the alarming ability of Grok to reveal personal addresses and offer stalking advice, highlighting ethics in AI. Jenny also unpacks the audacious Louvre heist, illustrating how thieves exploited normalcy to evade security. Rob emphasizes the vulnerabilities of Microsoft 365, stressing the dangers of misconfigurations and over-privileged accounts, which can lead to significant security risks.
undefined
32 snips
Dec 4, 2025 • 45min

A hacker doxxes himself, and social engineering-as-a-service

Rik Ferguson is an experienced cybersecurity professional known for sharing insights on cybercrime trends. In this discussion, a teenage hacker inadvertently doxxes himself while mocking a sextortion scammer. Rik highlights how essential stolen data has become for cybercriminals and predicts a grim outlook for 2026, citing a rise in ransomware and social engineering-as-a-service. The conversation also addresses notable data breaches and their consequences, reflecting on how operational security mishaps can have serious real-world repercussions.
undefined
16 snips
Nov 27, 2025 • 41min

The hack that brought back the zombie apocalypse

Dan Raywood, a seasoned cybersecurity journalist with 17 years of experience, dives into the eerie world of broadcast hacks. He highlights how unsecured systems allowed hackers to hijack emergency alerts, replacing gospel messages with explicit furry content. The conversation also touches on a recent insider threat at CrowdStrike, raising questions about both intentional and coerced breaches. Plus, a nostalgic nod to the Max Headroom incident and the struggles broadcasters face in prioritizing security adds a fascinating layer to their discussion.
undefined
23 snips
Nov 20, 2025 • 55min

We’re sorry. Wait, did a company actually say that?

Tricia Howard, a security intelligence pro at Akamai, and Snehal Antani, former JSOC CTO and current CEO of Horizon3.ai, delve into fascinating insights on cybersecurity. They reveal a rare corporate apology after a data breach and discuss the malicious hotel-booking malware targeting guests. Tricia explains how attackers exploit trust in booking systems, while Snehal shares the benefits of continuous autonomous penetration testing. They explore how AI affects both cybercrime and security responses, highlighting critical questions for CISOs.
undefined
20 snips
Nov 13, 2025 • 38min

Tinder’s camera roll and the Buffett deepfake

Join Ron Eddings, founder of Hacker Valley Media and a creative force in cybersecurity, as he dives into the wild world of AI and deepfakes. Tinder’s new feature that rummages through users' camera rolls raises serious privacy concerns, while deepfake Warren Buffett scams target unsuspecting investors. Ron emphasizes the importance of verifying information from trusted sources and reading books over fleeting social media clips. They also explore the implications of AI agents in the workplace and the need for safeguards to prevent potential mishaps.
undefined
31 snips
Nov 6, 2025 • 39min

The hack that messed with time, and rogue ransomware negotiators

Joining the discussion is Dave Bittner, an experienced cybersecurity journalist and host at The CyberWire. He dives into astonishing stories of a state-backed hacking group targeting a nation’s master clock, revealing the potential chaos that could ensue. Bittner also uncovers the shocking case of rogue ransomware negotiators in Chicago who turned into extortionists. Together with Graham Cluley, they explore the ethics and risks surrounding unregulated negotiation in the cybercrime landscape.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app