Files
hpr-knowledge-base/hpr_transcripts/hpr3387.txt
Lee Hanken 7c8efd2228 Initial commit: HPR Knowledge Base MCP Server
- MCP server with stdio transport for local use
- Search episodes, transcripts, hosts, and series
- 4,511 episodes with metadata and transcripts
- Data loader with in-memory JSON storage

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <noreply@anthropic.com>
2025-10-26 10:54:13 +00:00

105 lines
8.7 KiB
Plaintext

Episode: 3387
Title: HPR3387: Infosec Podcasts Part 5 Grab bag
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr3387/hpr3387.mp3
Transcribed: 2025-10-24 22:29:42
---
This is Hacker Public Radio Episode 3387 Fortunity, the 27th of July 2021.
To its show is entitled, Infosic Podcasts Part 5 Grab Bag and is part of the series podcast
recommendations it is hosted by Trey and is about 8 minutes long and carries an explicit flag.
The summary is, presenting my favorite podcasts related to various aspects of information security.
This episode of HPR is brought to you by Ananasthost.com.
Get 15% discount on all shared hosting with the offer code HPR15. That's HPR15.
Better web hosting that's honest and fair at Ananasthost.com.
Hello and welcome to Infosic Podcasts I Listen to Part 5.
Thank you to everyone who's listened to my previous episodes. I hope I'm not boring
you all to death. Why am I recording this series?
Alright, time out. You can hear my reasons for why I'm recording this series by listening
to the introduction to any of my previous 4 episodes in this series. Yes, this is a shameless plug
for you to listen to my other works and I really don't want to bore people by being repetitive.
So, onto the next section because there are so many podcasts to list, I've broken them down
into 6 different episodes based on their topics. Part 1 was news and current events and that
was episode 3324. Part 2 was general information security. That was episode 3334.
Part 3 was career and personal development. That was episode 3344.
Part 4 was social engineering. That was episode 3368.
This episode Part 5 will discuss hacks and attacks, technical information and learning,
and Infosic communities, social and history type podcasts. Then Part 6 will wrap it up with
Infosic Leadership Podcasts. So, on with Part 5, the first category is hacks and attacks and my
favorite podcast in this category is tied. There's really two podcasts in this category. I love them
the same. They're both really amazing. The first one is malicious life by Randletty,
sponsored by Cyber Reason. Now, this is released. I'm going to say periodically. I've not been able
to really determine a absolute cadence for the release of these, especially recently. He's been
splitting up the podcasts into shorter snippets that are released more frequently, but they're
really, really exciting, well-produced, containing lots of detailed descriptions of specific historical
events in cybersecurity. When it comes to specific attacks, I mean, they covered all sorts of
different attacks from the Morris Worm to attacks that have happened recently and the stories
that are behind them. So, I encourage you to listen to this podcast. You can find it by googling
malicious life podcasts or by clicking on the link in the show notes. The second podcast in
this category is Darknet Diaries by Jack Recyder. This is a biweekly podcast and he presents
stories from the the darker side of the internet. This consists of interviews with a lot of people
who may participate in less than ethical or less than legal activities online, as well as people
who are red team or offensive security, security researchers and other folks that are on the more
offensive side. Jack is just an incredible job of putting these together and weaving a story that
draws your interest and keeps it. I mean, this is a series you could binge watch from the beginning
if you're interested. You can find it by googling Darknet Diaries or by clicking on the link in the
show notes. The next category is Technical Information and Learning Podcasts. And I've got two
podcasts in this group. The first is The Digital Forensic Survival Podcast. That's presented by
Michael Aclare. It's presented weekly. It's a deep dive into digital forensics and he presents a
lot of really valuable information. Every time I listen to it, I learned something that I had not
encountered before. Whether it's specific artifacts to look for in logs, specific ways to approach
performing forensics on specific operating systems, specific things to maybe ignore or other
approaches to doing your analysis. A really great way to look at things you can find it by googling
Digital Forensic Survival Podcasts or by clicking on the link in the show notes.
Next in this category is The Offensive Security Podcast by TJ Null and Jeremy Miller.
And this is sponsored by Offensive Security. They're the creators of the OSCP. That's Oscar
Sierra, Charlie Papa, but you really want to know what it stands for, right? Offensive security
certified professional certification. And it's a certification that basically tells the world
that you know what you're doing when it comes to penetration testing and red team type activities.
Breaking into systems for the purpose of educating people on what those weaknesses are.
Now, having listened to this podcast for several weeks now, I realize it probably belongs in
the career and personal development category. But I discovered it after I'd already recorded
that episode. So I'm sticking it here. It's interviews with red team practitioners and other
security professionals. And these interviews revolve around the various certifications or training
that's available within Offensive Security or ways you can prepare yourself to become
a security professional that understands and at least participates in the offensive side of
things. You can find it by googling Offensive Security Podcast or by clicking on the link in
the show notes. The last category is I've split up among community, social, history. It's kind
of a catch all for a wide variety of topics. And the first one that I'd like to list here is
Command Lying Heroes. This is hosted by Saronia Bark and it's sponsored by Red Hat.
This is a weekly podcast with gaps in between the seasons that tells stories about
how we got to be where we are today. From open source to DevOps to hardware to programming languages
and everything in between, she really tells a story and weaves together the different bits and
pieces of people who were influential and technologies that were influential and getting us from
early technology to where we are today. It's a very fascinating, well-produced,
again this is another one that you could binge watch. If you start to listen to some episodes,
you'll want to go back to the beginning and listen to them from the beginning. So you can find
it by googling Command Lying Heroes podcast or by clicking on the link in the show notes.
The last one in this episode is The Beers with Talos podcast. This is hosted by Mitch Neff, Craig
Williams, Joel Esler, Matt Olney. And they're all part of the Cisco Talos Research Center. These are
released periodically, I'll say. It's hard to get a good cadence on when they're released. These
people are all very heavily involved in security research and in a lot of investigations and
they've done a lot related to voting security relating to responding to threats relating to
discovering different types of vulnerabilities that are out there. I mean, Talos is a busy group.
And each of these folks are up to their eyeballs and work. So I can understand the
the challenges involved in getting them all together to record and release a podcast and then
having to edit it. Oh, good gravy. I would not want to be the person who has to edit this podcast.
But it's loads of fun. It's a lighthearted and sarcastic approach to
items of interest to the host. I'll say current issues and items of interest to the host.
It does revolve around information security, but it takes sometimes a tangential approach
and might throw in other things like robots attacking their owners or things like that.
You can find it by googling Beers with Talos podcast or by clicking on the link in the show notes.
So I hope that this series has helped introduce you to some new and interesting listening options.
Give them a try and I would love to get your feedback in the episode comments on the HPR website.
The next and final episode in this series will be about information security leadership podcasts
and I hope to record that soon. Thank you very much for listening.
You've been listening to HECCA Public Radio at HECCA Public Radio.org.
We are a community podcast network that releases shows every weekday, Monday through Friday.
Today's show, like all our shows, was contributed by an HPR listener like yourself.
If you ever thought of recording a podcast and click on our contributing to find out how easy it really is.
HECCA Public Radio was founded by the digital dog pound and the infonomicom computer club
and is part of the binary revolution at binwreff.com.
If you have comments on today's show, please email the host directly, leave a comment on the website
or record a follow-up episode yourself. Unless otherwise stated, today's show is released under
Creative Commons, Attribution, ShareLite, 3.0 license.