
America’s airwaves are haunted by zombies again, as we dig into a decade of broadcasters leaving their hardware open to attack, giving hackers the chance to hijack TV shows, blast out fake emergency alerts, and even replace religious sermons with explicit furry podcasts.
Meanwhile, we look at how a worker at a cybersecurity firm allegedly leaked internal information to a hacking gang – raising big questions about insider threats.
Plus: Frankenstein on Netflix, Vine nostalgia, and why Barney the Dinosaur may be the true criminal mastermind behind it all.
All this and more is discussed in episode 445 of the “Smashing Security” podcast with cybersecurity veteran and keynote speaker Graham Cluley, and special guest Dan Raywood.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
Smashing Security, Episode 445: The Hack That Brought Back the Zombie Apocalypse. With Graham Cluley and special guest Dan Raywood.
Hello, hello, and welcome to Smashing Security episode 445. My name's Graham Cluley.
This sort of time, I think Halloween-ish, October 2018.
I worked for a bunch of magazines, including SC Magazine, Infosecurity, Dark Reading. I've been an analyst, been a marketer.
Now, I work mainly for a great company called BORA, who do content creation, all sorts of stuff, really, really great clients.
I'm also a bit of a freelance hired gun on the side, do some speaking, do some moderating, and occasionally take a few podcast appearances, which are really nice.
We'll be hearing more about them later on in the podcast.
This week on Smashing Security, we won't be talking about how fake adult websites are pushing a hyper-realistic but fake Windows Update popup to install malware.
You'll hear no discussion of how a Japanese court has found Cloudflare liable for ignoring takedown requests and aiding and protecting a manga piracy site.
And we won't even mention how a former romantic partner of ex-Google chairman Eric Schmidt has accused him of hacking her email and PC to spy on her and steal business secrets.
So Dan, what are you going to be talking about this week?
Okay, before we go any further, I need to share a quick word with you about one of our sponsors today, Vanta. You know how everyone's got an AI assistant these days?
Well, imagine one that doesn't just write haikus about zero-day vulnerabilities, but actually does your audit work for you. That is Vanta.
It connects to all of your tools, gathers evidence, tracks compliance, and quietly helps you prove that yes, you do take security seriously. Vanta automates all of that.
It pulls everything together, keeps an eye on your systems, and basically makes sure you're ready for an audit at any time, which means no last-minute panic for screenshots and policies.
It also plugs into the tools you're already using and flags up issues before they become a right old mess.
So if that sounds like something that might save you from a few sleepless nights, check out vanta.com/smashing. And if you use that link, you'll get $1,000 off.
So don't forget vanta.com/smashing. And thanks to Vanta for sponsoring this week's episode. On with the show. Now, Dan, what were you doing in 2013? Do you remember?
I think there was a slight reunion of Destiny's Child briefly up on the stage.
That year she had a work thing, so we recorded it and watched it on the Monday afternoon, which is brilliant because we were able to fast forward through all the power when the TV company went down for about an hour.
Quite a notable Super Bowl, 2013.
At least not one that you've dared admit to to your wife.
Because there was an uprising of zombies. On February 11th, 2013, fans of the Steve Wilkos syndicated TV show in Montana— you may know Steve.
He was Steve the security guard on the Jerry Springer Show.
He was popular for breaking up fistfights between cousins and generally being muscly and bald and big and a bit of a bruiser. It was his show.
That people were watching when this happened.
Follow the messages on screen that will be updated as information becomes available. Do not attempt to approach or apprehend these bodies as they are considered extremely dangerous.
That's right, the zombie apocalypse was announced during daytime TV.
This was an emergency alert system which kicked in and warned people, not just in Montana, but also in Michigan, where viewers got their undead warning during Barney and Friends.
Barney's pretty upsetting in itself, I'd say, actually.
There wasn't actually a zombie uprising, and this may shock you, but hackers had actually gained access to the broadcasting system and the broadcast, as it turned out, in a technique which no hacker has ever used before or since.
The hackers were using default passwords that were listed in user manuals, manuals that were helpfully published in public so anyone could find out what the passwords were and then access these systems and mess with a TV broadcast.
It's bonkers, isn't it, this sort of thing happens?
And I don't think they ever worked out who was responsible for that hack or what the purpose was?
How do you catch someone? They tried to forensically identify someone's hand using a fly spotter, didn't they?
The authorities had to tell grown adults running TV stations, because this was back in 2013 when it was adults running TV stations rather than the dystopian toxic hell pit we live in today.
They had to tell them to change their passwords. And that always seems to me a little bit telling an air steward not to forget to close the door before takeoff.
It's fairly elementary stuff, you would to think. So that was the great zombie panic of 2013. You've spoken about the Max Headroom incident.
You'd think stations would learn from these kind of things, but you're wrong. Because if you fast forward to 2016, and there was an incident involving furries, Dan.
Are you familiar with furries at all?
Those are little internet boxes that send audio from a radio station studio to the transmitter.
And the hackers aired an episode of a podcast, a podcast called The Furcast, which is all about— well, put it this way.
I did an internet search for FurCast to find out if I could listen or view any of the episodes.
And I found a bunch of men sat around a table dressed up as foxes and pandas and all kinds of furry gear. I mean, if that's your thing, fair enough, or maybe fur enough.
Have things got any better in 2017? And Donald Trump has been inaugurated for his first of what I think is likely to be about 17 stints inside the White House.
I'm sure he's not going to stop at 2 or 3. And you think, surely we've learned by now.
Nope, because during Trump's inauguration, stations started blasting out a hip-hop song called FDT by some fellows called YG and Nipsey Hussle.
Now, I know you really like your music, Dan. You're really big on music, aren't you? Have you ever heard of YG and Nipsey Hussle and their song FDT?
I thought maybe it's Furious Doughnut Thrower or furry disastrous transmission or frequently delusional tweets, but apparently it's fuck Donald Trump.
And if you listen to the song, that is one of many words which I would have to bleep out if I include it inside this podcast. Fuck Donald Trump. Yeah, fuck Donald Trump.
Yeah, fuck Donald Trump. Yeah. So the president of a radio station in Louisville, WCHQ, they admitted it was their fault.
They said other stations that this happened to have contacted me. We all use the same device. None of us had set a password on the device. And they said, my bad.
I'd done other security measures at the transmission tower and the studio, but I failed to password protect this device. I like that. My bad.
Wouldn't it be great if every time there's an organization which suffers a data breach, it just says, my bad, oops, whoopsie, whoopsie daisy.
You say whoops or my bad when you forget to bring potato salad to the barbecue, not when you let hackers turn your classic hit station into some sort of uncensored political diatribe.
So here we are now, Dan. It's 2025. We're 12 years after, not quite 28 years after, the zombie incident.
And ESPN Houston has just been hijacked during its coverage of a game between the Philadelphia Eagles and the Dallas Cowboys. I think they're American footballers.
The hackers are actually doing the same kind of thing. They're still playing emergency alerts over hacked radio stations, just like they were back in 2013. It's been over 10 years.
And radio stations and TV stations still being hacked due to their IP addresses being included on the Shodan database.
Shodan, for those who don't know, is basically Google for hackable devices.
Tells you where all devices are, which are open to the public and not being configured properly to avoid unauthorized access.
So it's really easy for these unsecured devices to be found and to be exploited by the hackers, isn't it?
You get some new thing and you're like, oh, does it work?
I mean, Christmas is, as we record, literally a month away, people getting some sort of internet-connected toy, Bluetooth-enabled, whatever.
And it's like, is your first priority going to be, oh, is it going to be secure?
Now, a kid's toy versus some sort of thing you're going to be using in workplace are very different things, but you think that if it's going to be used for all that time, there'd be some sort of audit.
Unfortunately, there probably isn't very much budget for that. It's a problem.
So this happened, and one station, they received a call from a listener because they heard obscene lyrics instead of the religious teachings from Pastor Doug Batchelor.
You can imagine how that phone call may have gone. But these aren't really sophisticated hacks.
They literally are just checking if you changed the password from admin admin to something else.
So Barix, who are the makers of these station-to-transmitter devices, they say that they now have better security on their gizmos.
They say they now come with unique passwords already set because broadcasters can't be trusted with the complex task of actually typing in a new password.
And there apparently are currently 600 to 650 publicly accessible Barix devices around the world, around 300 of them in the USA.
Many of them will be these older devices which don't have unique passwords. All of them are waiting for a bored teenager to find them.
The question is, is it gonna spur others into action and thinking, are we running this? But you mentioned the budget thing.
There was a great piece on John Oliver's show a couple weeks ago about PBS and funding. And it's some of these places are running on absolute shoestrings.
So is there actually gonna be any sort of priority for essentially what we call cybersecurity versus trying to keep, you know, the lights on essentially.
Keeping the lights on, keeping the transmitter going, you know, it's just about having power and they're probably struggling to get the advertising and sponsorship to keep their station alive.
It's a problem. By the way, this zombie incident was particularly amusing because a disc jockey actually played a tape of the zombie EAS alert.
So he was telling the story to his listeners. He played the tape, which included this digital tone which plays, and that happens before the emergency alert.
And apparently, playing that tone across the radio triggers more alerts downstream. It's a domino effect. This chaos unfolds.
So, it's a bit saying, "Alexa," on a podcast, because those type of devices are going to hear it. And then will trigger actions.
So machines can't necessarily tell the difference between a real emergency alert and someone playing a recording of a fake emergency alert, which is pretty understandable, I think.
But I was speaking to someone the other day and they said to me, frankly, your nephew's Minecraft server is probably more secure than some organizations.
They're more likely to have locked it down. I certainly think that's probably the case with these radio stations.
So my advice to broadcasters is imagine your broadcasting equipment is a bit like your teenager.
You wouldn't leave them unsupervised overnight in the house over the weekend with the drinks cabinet unlocked.
Because before you know it, your house is going to be overrun full of other teenagers having a house party, general havoc occurring.
So treat your professional broadcasting equipment with the same level of concern you would give stopping your kid from going on a bender.
And I think that's advice which we can all probably take into our workplaces and into our homes as well, is really, really concentrate on securing those devices and making it as hard as possible for your accounts and your devices to be accessed by unauthorized users.
And essentially part of that is understand what you need to keep your business running and secure.
We think after the first one's happened in what, 2013 was it with Barney the dinosaur? You think they'll spur them into action? I don't really know.
Maybe just it's not the priority that we often feel it should be.
He tries to give across a sort of harmless image, but I think behind that face, maybe there's an evil criminal mastermind at work.
Right then, we've got time for a quick word now about one of our sponsors today, Action1. Now, most security breaches still happen because of unpatched vulnerabilities.
And the worst part? Many already have fixes available for them. But patching can be a real pain, right?
If staying up at night worrying about the next cyberattack headline sounds familiar, it's time to try Action1, the patch management platform that just works.
You can start updating Windows, Mac, and third-party apps in under 5 minutes. And Linux support is coming very soon. The best part?
Well, your first 200 endpoints are free forever with no functional limits. This isn't a disguised free trial. There's no credit card required, no hidden limits, no tricks.
All you have to do is visit smashingsecurity.com/action1 and get started today.
So if you're looking to automate patching and save weeks or even months doing it, go to smashingsecurity.com/action1 and sign up for patching that just works.
And thanks to Action1 for supporting the show. Dan, what have you got for us this week?
They had a particularly nasty incident which sort of put most of the world offline for several hours.
And I wrote a story based on what I could find on X and Reddit, which aren't the greatest sources, but there wasn't very much information.
But yeah, CrowdStrike, I mean, they recovered and still remain an absolute huge cybersecurity company and do some great research.
But they haven't really failed to keep out of the headlines. Now, that was a bit of a bad incident, a bit of a one-off.
But in the past few days, a report has come out where it confirmed that it fired what they call a suspicious insider in October for allegedly sharing internal information with a hacking collective.
So we'll get to insider threats in a bit, but yeah, what essentially CrowdStrike is saying is that someone shared information with an outsider.
And that outsider then, through various means, was able to then try and access CrowdStrike.
And screenshots posted on a public Telegram channel appear to show insider-level access to CrowdStrike systems, including an employee's Okta dashboard.
Now, of course, Okta is the single sign-on.
The screenshots were shared by the Scattered Spider Lapsus Hunters. Now, not only for being a really silly long one, remember LulzSec? How easy was that to write?
Oh yes, they could write 3 words, you know. I'm reading Joe Tidy's book, and what would they call them? Hack the Planet, HTP. That's 3 letters.
Why don't they just Scattered Spider Lapsus Hunters? Seriously. Anyway, but they combine Shiny Hunters, Scattered Spider, and Lapsus$ with a dollar.
So those 3 groups all kind of came together a little while ago. So they claimed the access of CrowdStrike exploiting data from the Gainsight.
Now that's a CRM platform used by Salesforce, and then presumably it's then used by CrowdStrike as well. And they were able to exploit that data and apparently get in.
Now, we don't know how much of that is true, but what I think we're looking at here is a bit like with our friend Joe Tidy, who the other month had the situation where some hackers said to him, we give you loads of money, give us access to your network.
Do you remember that one?
They can give him lots of money, but it's an interesting one again, because this situation shows that if you go for the sort of the weak link, now we don't like to think of humans as the weak link, 'cause that just creates arguments, doesn't it really?
But if you go for someone internally and say, hey, give me information, give me access, and for whatever reason, whether they're blackmailing them, whether they're giving them money like with Joe's situation, but CrowdStrike said the insider simply shared pictures of the computer screen externally, so it's external source.
That led to immediate termination. Now you'd probably argue that's probably the right action to take.
I'm presuming that the DLP was switched on to max for that particular employee's output, however they were trying to send out from their computer.
In other words, did they take the screenshots with them on a secure USB, put it in their Google Drive, whatever?
I hope they've also reported him to the authorities, because if they're claiming he somehow assisted a group of malicious hackers or shared sensitive information, that is something the police need to investigate, isn't it?
You've got the situation where the insider, I guess, is leaking information.
If you worked for a bank and sort of said, here's all the PIN numbers for a million people, that's a crime. It's data theft, essentially.
It starts at 0000 and goes up to 9999.
So, you know, it's different, of course, if you have names associated with the PIN numbers, but the numbers themselves, that shouldn't be something which is an arrestable offense, I think.
But yeah, but in situations where someone steals something internally, let's say, you know, if you run off with a laptop, for example, okay, you can brick that.
Or if you run off with the coffee machine, good luck getting that up your jumper. But so shared pictures of the computer screen, this was what they got immediately terminated for.
Now, CrowdStrike have rejected the claim that actually data was stolen, which the hackers claim they did.
But CrowdStrike reject that claim saying systems were never compromised and customers were always protected. Now, as we were saying earlier on, we take security seriously.
CrowdStrike, I really hope they do, and I'm sure they do as well. But they have handed the case to law enforcement for further investigation. So that's where we're at at the moment.
It's essentially someone got found out for apparently leaking data. Maybe it's just screenshots of an Okta platform.
And as a result, someone got fired and handed over to the police for it.
So that's what we know, but it's not, I don't say it's particularly uncommon, but I think it's probably unreported.
Funny how this one got out to Zack and Lorenzo over at TechCrunch because Gainsight, again, the CRM system that we presume CrowdStrike was using, and the Hackers' Allegiance was the source of the breach, did not comment on either.
They're not going to turn around and go, yeah, we're the weak link, blame us, yeah, blame Gainsight.
But what we do know is that Lapsus$, Shinyhunters, or whatever we call them, this collective, are known for using social engineering tactics to trick employees into giving access to systems.
Now, that's different from bribing, like we saw with Joe, and I'm sure others.
They're actually trying to get people to give up things whether it's through, here's an email, here's clips of the Eagles-Cowboys game, or here's, did you read this about the zombie network takeover?
I'd probably read that, or the Black Hat incident.
So you've got a rogue employee who maybe has access to sensitive information, can take screenshots, can send them to a hacking gang who he may be working with.
And then of course, we are always hearing at the moment about these support lines being rung up by the hackers and they socially engineer information out them.
They claim to be employees, for instance, saying that they've been locked out of their accounts.
I wonder about the middle ground though, where maybe someone who works in a call center for a particular organization has been nobbled by a hacking gang and the hackers say, look, and they don't say this during the course of the phone call, obviously, but outside of that, they say, "We'll be ringing you on Monday morning and we're going to do a bit of social engineering on you." And they say, "Yep, okay, I will fall for the social engineering and I will agree to unlock this account for you, or I'll make sure that the social engineering works." So you could have this kind of hybrid effect.
And then the employee, if it was determined who it was, who was tricked by— I put tricked in quotes— by the hackers, they could maybe have plausible deniability and say, "Oh, well, I was just socially engineered."
Who's going to really be caring at that stage? Suddenly all of a sudden they're interested in you.
If you really profile the person, what they're into, Doctor Who, for example, or you know, Philadelphia Eagles or Bitcoin, I probably wouldn't, I'm not really a fan, but it's actually a very, very simple way of doing things, but it takes time, and if you fail at it, then all that effort goes to waste from the hacker's perspective.
But apparently here, who knows, because CrowdStrike and GameSight both not commented and denied whatever.
They're actually the ones coming out saying, you know, almost we're not to blame, but someone was to blame. Hmm.
I think a lot of the cybersecurity companies love to talk about external hackers, and maybe their solutions are better at handling that kind of threat rather than the insider threat just as much.
The insiders who, of course, you've given your passwords to, you've allowed to access the databases and the sensitive information because they need it to do their job.
But of course, there's always the potential that they will leak it, or even if they can't make a copy of it onto a USB drive, they can take a photograph of a screen, or just simply memorize a piece of information, which they take home with them and then later exploit in one fashion or another.
It's a really significant problem.
That seems quite low to me.
To malicious intent such as we saw here, or apparently saw here, going out and actually putting information out there that people are looking for.
So if it covers that broad spectrum, I'd say the number's probably significantly higher than 13.5. But again, how many of these are actually reported? Do you go to your regulator?
Do you say, oh yeah, we had someone do this and, you know, they clicked on the link and we got ransomware? Okay, and did you clean up?
Yeah, we called in whichever consultancy or firms to come and sort it out. Great. Do you need to report that? I don't think you do.
It's not like a data breach where you have to go to the ICO and say, this is what we lost, because if you didn't lose anything, it's a really tricky one to kind of determine.
You can't defend what you don't see, and that's why Horizon 3 AI created NodeZero to continuously test your network the same way real attackers would and built to help you prove your defenses work.
Traditional pen tests happen once a year. They're manual, they're expensive, and they're outdated the moment they're done.
NodeZero changes that by continuously testing your environment.
With over 170,000 pen tests completed, NodeZero doesn't just find vulnerabilities, it proves how they can be exploited safely.
From Active Directory tripwires to AI-driven attack paths, you'll see your network the way an adversary does and before they do.
Join thousands of organizations who've moved from reactive to continuous security because the best defense is understanding offense.
Visit horizon3.ai to get your autonomous pen test demo today. That's horizon3.ai. And thanks to Horizon 3 AI for supporting the show. And welcome back.
Can you join us at our favorite part of the show? The part of the show that we like to call Pick of the Week.
It doesn't have to be security-related necessarily.
Yes, I haven't gone back to 1958 to choose some classic old movie that I've just discovered. This is one that's fairly new out. It is Guillermo del Toro's version of Frankenstein.
Have you seen it, Dan?
It's obviously an adaptation of Mary Shelley's classic book, so it's drenched in atmosphere and stunning visuals, and in fact, it's more sort of heartbreaking than horrific, and I think it's all the better for that.
So we all know the story. We've got Dr.
Frankenstein who wants to see if he can defeat death, whether he can bring people back to life by taking the parts of human beings who've deceased and putting some electricity through them.
And it's really rather good. I really enjoyed it much more than I was expecting. It's got some terrific performances from Oscar Isaac.
He was Poe in the Star Wars: The Force Awakens trilogy. He plays Victor Frankenstein. And Jacob Elordi is the creature itself.
And it was briefly at the cinemas and is now available for anyone who subscribes to Netflix. And I thought it was visually stunning.
The guy who played Romeo in Zeffirelli's Romeo and Juliet was playing Victor Frankenstein. I saw that one.
I like Oscar Isaac. I saw him in the Star Wars films and a couple of other things as well. Yeah, sounds cool.
It was a little app that could really, the whole thing was making 6-second videos. If you think 6 seconds, what can you achieve?
And actually people got quite famous through this, but they got acquired by Twitter very, very soon after launch.
And I think there was a feeling in the podcast, they'd almost sold up a little too early because Twitter didn't really seem to know what they were getting and how to embed these little Vines into tweets.
They didn't have that sort of functionality. There was also when they tried to evolve it, they moved it from 6 seconds, which was kind of its USP really, to 140 seconds.
Now, a lot of our favourite, The Beatles, some of their songs are barely 140 seconds. Some of their early stuff is 2 minutes.
Now you could put a whole Beatles song in a Vine and just let it run. There's some Elvis stuff. But it got critically panned for that move.
Spoilers here, people, but one of the reasons it really failed is because it didn't really have any monetization plan behind it because essentially, how do you make money out of a 6-second video?
Can you do it for Google or Nickelodeon, for example? How do you do a 6-second video that's promotional for a company. So it didn't really have that monetization plan.
But it's, yeah, so 6 seconds doesn't give you a lot of time to sell something really. And the other real problem in monetization is that basically the creators held all the power.
They're the ones who were getting the commissions from Google and whoever else to sort of make videos for them.
And some of its famous Vine users include Logan Paul, who went on to create the drink Prime. He even went to YouTube.
There's also a lot of others that get featured and it's all very much like, yeah, we did pretty well out of this, but Vine didn't.
Once people realized they couldn't make any more out of them, they moved on to something else. Right. Basically, the takeaway is that Vine walked so TikTok could run.
Essentially, what we saw is people moved to probably YouTube first, then Instagram, now TikTok. They make the money there, but they're the ones who hold all the power.
And the platform in that case was just the conduit for where to be seen.
I used to like looking at TikTok when it was a bit more open on the tube. It was quite fun during lockdown with all the sort of the NHS dances and all that sort of thing.
Thank you so much, Dan, for joining us. I really appreciate it. I'm sure lots of our listeners would love to find out what you're up to and follow you online.
What's the best way for them to do that?
I don't look very often, but yeah, LinkedIn's probably my best one to find me.
And don't forget to ensure you never miss another episode. Follow Smashing Security in your favorite podcast app, such as Apple Podcasts, Spotify, and Pocket Casts.
Episode show notes, sponsorship info, guest lists, and the entire back catalog of 445 episodes, check out smashingsecurity.com. Until next time, cheerio. Bye-bye.
And of course, to all of you chums who've signed up for Smashing Security Plus over on Patreon.
They include Philip Dade, Sammy Dozer, Nate M, Andrew Davison, Bobby Hendrix, Richard Anand, MJ Lee, Florian Schwalme, Stephen Castle, Heisenberg, Matthew Hunt, Funky Duck, Christo V, Skadone, Marvin 71, and Dave and Pam.
Well, wouldn't you like to hear your name read out at the end of the show from time to time? All you've got to do is consider joining Smashing Security Plus.
For as little as $5 a month, you will become part of our happy little troupe, and you'll get early access to episodes, without the annoying ads.
And you'll get that warm glow of feeling that you're helping me out, which I always appreciate. Thank you very much. Just head over to smashingsecurity.com/plus for more details.
Now, of course, I realize Patreon isn't for everybody, and that's perfectly fine. There's absolutely no pressure to become a member of Smashing Security Plus.
The truth is you can support the show in plenty of other ways which don't have to cost you anything really.
You can just like, subscribe, leave a nice review up on Apple Podcasts, something like that. You can tell your friends about the show. Just spread the word.
Maybe tattoo across your forehead, "I love Smashing Security," and slick back your hair so everyone can see it. Actually, don't do that. That sounds like a really terrible idea.
So I don't endorse it. If you do do that, it's not my fault. But every little bit, apart from the tattoos, does help. And so until next time, cheerio, bye-bye.
Host:
Graham Cluley:
Guest:
Dan Raywood:
Episode links:
- Fake adult websites pop realistic Windows Update screen to deliver stealers via ClickFix – Acronis.
- Tokyo Court Finds Cloudflare Liable For Manga Piracy in Long-Running Lawsuit – TorrentFreak.
- Former Google chief accused of spying on employees through account ‘backdoor’ – LA Times.
- Bogus zombie apocalypse warnings undermine US emergency alert system – Ars Technica.
- 2013 EAS Zombie Hoax – Emergency Alert System Wiki.
- The 1987 Max Headroom incident – YouTube.
- Nation-wide radio station hack airs hours of vulgar “furry sex” ramblings – Ars Technica.
- ESPN 97.5 Houston Victim Of Barix Hack – Radio Insight.
- ESPN Houston apologises to viewers – Facebook.
- CrowdStrike fires ‘suspicious insider’ who passed information to hackers – TechCrunch.
- Frankenstein official trailer – YouTube.
- Frankenstein – Netflix.
- Vine: Six Seconds that changed the world – Global Player.
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
Sponsored by:
- Action1 – Keep your systems safe (and your sanity intact) with the patch management platform that just works. The best part? Your first 200 endpoints are free, forever, with no functional limits.
- Vanta – Expand the scope of your security program with market-leading compliance automation… while saving time and money. Smashing Security listeners get $1000 off!
- Horizon3.ai – Get an autonomous pentest demo and see your network the way attackers do. Visit Horizon3.ai.
Support the show:
You can help the podcast by telling your friends and colleagues about “Smashing Security”, and leaving us a review on Apple Podcasts or Podchaser.
Join Smashing Security PLUS for ad-free episodes and our early-release feed!
Follow us:
Follow the show on Bluesky, or join us on the Smashing Security subreddit, or visit our website for more episodes.
Thanks:
Theme tune: “Vinyl Memories” by Mikael Manvelyan.
Assorted sound effects: AudioBlocks.