
2026
May 4, 2026Recent reviews on Apple Podcasts (5)
Highly Recommend
I appreciate the sound advice given on current security events as well as other comments! I follow this podcast this every Monday.
KWGraves ·
30% ads 50% useless chatter
Only a tiny fraction of the show is valuable, and that too going over news articles. A lot of wasted time. But that’s just me.
Tony-Stark-0 ·
Entertaining, insightful and actionable! 👏👏👏
Whether you’re well established as someone who can translate creative energy into the impact you want to have on the cyber security industry, or just getting started as a catalyst for change - this is a must-listen podcast for you! Tom and Scott do an incredible job leading conversations that cover a huge breadth of topics related to the ins and outs of building a thriving career in data security, and life you can be proud of - from leaders who’ve actually walked the path. Highly recommend listening and subscribing!
obacker19 ·
Awesome and helpful!
Love this show. Always keeps me interested and always look forward to new episodes. Can’t recommend it enough. -Tabby from Your New Best Friends podcast
HelloandNo ·
Great pod!
So helpful, great podcast!
Abpfinance ·
Episodes (558)

Fake Party Invites and the Rise of Social Phishing Attacks
May 4, 202615m
Attackers are now impersonating invitation services to trick people into clicking malicious links and sharing sensitive information. These phishing attempts look like legitimate event invites, making them especially effe

New York’s 3D Printing Crackdown: Security or Surveillance?
Apr 27, 202615m
New York’s latest budget proposal could fundamentally change how 3D printers work—requiring built-in software that scans and blocks certain designs. Supporters say it’s about stopping ghost guns. Critics say it opens the

Project Glasswing: When AI Becomes the Ultimate Hacker—and Defender
Apr 20, 202628m
Anthropic has introduced Project Glasswing, a cybersecurity initiative powered by an unreleased AI model called Claude Mythos. This system can identify zero-day vulnerabilities, generate exploits, and even help fix them—

The Dark Web Explained with John Hammond
Apr 13, 202622m
The dark web is often misunderstood, but it plays an important role in both privacy technology and cybercrime activity. In this episode, Tom Eston speaks with cybersecurity researcher and educator John Hammond about what

Meta & YouTube Found Negligent: A Turning Point for Big Tech?
Apr 6, 202613m
A landmark jury verdict has found Meta and YouTube negligent in a social media addiction case, raising major questions about platform accountability and legal protections under Section 230. This episode covers the detail

The Hidden Tracking Risk Inside Your Tires
Mar 30, 202614m
In this episode, Tom Eston and co-host Scott Wright discuss research showing that Tire Pressure Monitoring Systems (TPMS) can create privacy risks because the sensors broadcast unencrypted, uniquely identifying wireless

The Real State of Offensive Security: AI, Penetration Testing & The Road Ahead with Andrew Wilson
Mar 23, 202644m
Tom Eston interviews offensive AI researcher and PhD candidate Andrew Wilson, a former Bishop Fox partner who helped grow the firm from under 20 people to nearly 500, built award-winning AI solutions for SOC modernizatio

The Privacy Problem With Meta’s Ray-Ban Smart Glasses
Mar 16, 202618m
This episode discusses Meta Ray-Ban Smart Glasses, which blend a camera, microphone, AI features, and social media integration into sunglasses that look like normal fashion eyewear, raising major privacy concerns. It hig

TikTok Says No to End-to-End Encryption: Here’s Why That’s a Big Deal
Mar 9, 202615m
In a move that bucks the entire industry trend, TikTok has confirmed it will not implement end-to-end encryption (E2EE) for direct messages on its platform — arguing that E2EE would make users less safe. We break down wh

Claude Code Security: The AI Shockwave Hitting Cybersecurity
Mar 2, 202613m
Anthropic’s Claude Code Security research preview promises AI-powered code analysis and vulnerability detection at scale. The announcement triggered strong reactions across the cybersecurity community and sent several ve

TikTok’s New U.S. Deal and Privacy Policy: What Users Don’t Understand
Feb 23, 202616m
TikTok has shifted to a majority-American entity, TikTok USDS Joint Venture, LLC, to comply with U.S. national security requirements and avoid a ban. This week we discuss why a recent privacy policy update went viral—esp

Ring’s Search Party ‘Dystopia’ Debate & Claude Zero-Click RCE Vulnerability
Feb 16, 202624m
In this episode, we discuss two major tech stories impacting privacy and security. First, we analyze Ring’s new AI-powered ‘Search Party’ feature and its controversial Super Bowl ad that sparked privacy concerns. We then

OpenClaw & Moltbook: AI Agents and Cybersecurity Risks
Feb 9, 202621m
Autonomous AI assistants are hitting the mainstream — but at what cost? This week, we discuss the recent OpenClaw phenomenon (formerly Clawdbot/Moltbot), the security fiasco surrounding Moltbook’s exposed database, and t

Why Gen Z is Ditching Smartphones for Dumbphones
Feb 2, 202619m
Younger generations are increasingly ditching smartphones in favor of “dumbphones”—simpler devices with fewer apps, fewer distractions, and less tracking. But what happens when you step away from a device that now functi

AirDrop Security in iOS 26.2: Time Limits, Codes & Privacy Best Practices
Jan 26, 20267m
In this episode, we explore the latest changes to AirDrop in iOS 26.2 and how they enhance privacy and security. Learn about the new 10-minute limitation on the ‘Everyone’ setting and the introduction of AirDrop codes fo

Ring’s Facial Recognition Feature: Convenience or Privacy Nightmare?
Jan 19, 202615m
In this episode, we explore Amazon Ring’s newly introduced Familiar Faces feature that utilizes AI for facial recognition. We discuss the convenience of identifying familiar people at your doorstep, the privacy concerns

Your Google Searches Aren’t Private? PA Court’s Surprising Ruling
Jan 12, 202616m
In this episode of Shared Security, we discuss a significant Pennsylvania Supreme Court ruling that permits police to access unprotected Google search histories without a traditional warrant. The discussion centers aroun

AI and the End of the Traditional Entry-Level Tech Job
Jan 5, 202614m
Welcome to the first episode of the Shared Security Podcast in 2026! As AI becomes increasingly integrated into technical fields such as software development and cybersecurity, traditional entry-level roles are evolving

2025 Predictions: Hits, Misses & What We Learned
Dec 29, 202536m
Join us this week as we rewind the tape on our 2025 predictions. In this episode, we revisit last year’s forecasts in cybersecurity, geopolitics, and AI, discussing which ones came true, which ones fizzled out, and which

Why Networking Is Your Secret Weapon in Cybersecurity Job Hunting
Dec 22, 202512m
In this episode, Tom Eston discusses the unique challenges in the current cybersecurity job market, emphasizing the importance of networking. Tom provides practical tips on how to enhance networking skills, such as atten

The Hidden Threat in Your Holiday Emails: Tracking Pixels and Privacy Concerns
Dec 15, 202518m
Join us in the midst of the holiday shopping season as we discuss a growing privacy problem: tracking pixels embedded in marketing emails. According to Proton’s latest Spam Watch 2025 report, nearly 80% of promotional em

Seeing Is Not Believing: How to Spot AI-Generated Video
Dec 8, 202517m
In this episode we discuss the rising challenge of AI-generated videos, including deepfakes and synthetic clips that can deceive even a skeptical viewer. Once the gold standard of proof, video content is now increasingly

So You Want to Be a CISO? With vCISO and Security Justice Alum Chris Clymer
Dec 1, 202531m
In this special episode of the Shared Security Podcast, host Tom Eston reunites with former co-host and experienced fractional CISO, Chris Clymer. They reminisce about their early podcasting days and discuss the evolving

AI Agent Does the Hacking: First Documented AI-Orchestrated Cyber Espionage
Nov 24, 202518m
In this episode, we discuss the first reported AI-driven cyber espionage campaign, as disclosed by Anthropic. In September 2025, a state-sponsored Chinese actor manipulated the Claude Code tool to target 30 global organi

OWASP Top 10 for 2025: What’s New and Why It Matters
Nov 17, 202518m
In this episode, we discuss the newly released OWASP Top 10 for 2025. Join hosts Tom Eston, Scott Wright, and Kevin Johnson as they explore the changes, the continuity, and the significance of the update for application