Look for any podcast host, guest or anyone
Showing episodes and shows of

CovertSwarm

Shows

You Deserve to be HackedYou Deserve to be HackedS2 E2: The Bank of England: Rethinking Cyber ResilienceIn this episode of YOU DESERVE TO BE HACKED, we sit down with representatives from the Bank of England and CovertSwarm to unpack the truth behind CBEST. This isn’t about pass/fail. It’s about exposing hidden assumptions, simulating real-world attacks, and stress-testing the entire financial ecosystem—starting at Tier 1 and scaling outward.We explore the mindset shift, how it informs operational resilience, and why STAR-FS might be the future for the rest of the sector. Whether you’re a regulator, a red teamer, or a CISO looking for answers beyond the audit, this conversation will challeng...2025-07-2359 minYou Deserve to be HackedYou Deserve to be HackedS2 E1: Inside the Spider - Anatomy of an attackSocial engineering. SIM swapping. MFA fatigue. These aren’t just headlines from last year. They’re live tactics, straight from the Scattered Spider playbook.In this episode, we join CovertSwarm’s own operators as we explore the methods used by threat groups like Scattered Spider. From helpdesk manipulation to full identity compromise, we break down the tactics, the weak points, and how attackers really move inside your org.-- Successful companies are constant targets for attackers. Those who take security seriously don’t test their defenses once a year....2025-06-1742 minYou Deserve to be HackedYou Deserve to be HackedNew Season Teaser: YOU DESERVE TO BE HACKED™ The PodcastThe CovertSwarm podcast has been running for nearly three years, but it's time for a revamp. We're hitting pause briefly before returning with something fresh, new, and more disruptive than ever. Look out for YOU DESERVE TO BE HACKED The Podcast - coming soon.-- Successful companies are constant targets for attackers. Those who take security seriously don’t test their defenses once a year. They subscribe to CovertSwarm.2025-01-2900 minYou Deserve to be HackedYou Deserve to be HackedEpisode 34 - The AI Impersonation with Ron EddingsIn this second episode hosted by Hacker Valley, Ron Eddings sits down with CovertSwarm’s Academy Hive Leader, Iain Jackson, for an eye-opening, innovative, and unsettling episode.This time, Ron’s voice is cloned live on air. Using cutting-edge AI impersonation tools, Iain demonstrates how attackers can weaponize synthetic voices to breach organizational defenses, this time by cloning our host's voice. They’ll dissect the mechanics behind this tactic and reveal why phishing got much more personal.While many still fixate on stopping email-based scams, Iain will expose the vulnerabilities in voice-based verification systems. From bypass...2024-12-3024 minHacker Valley StudioHacker Valley StudioHacking Trust with AI and Deepfakes featuring Iain JacksonWhat happens when cutting-edge AI meets the art of deception? In this episode, Iain Jackson, Academy Hive Leader at CovertSwarm, takes us through the uncanny potential and risks of synthetic voices and AI in cybersecurity.  Together, Ron and Iain discuss how adversaries are using AI to bypass human intuition. From synthetic voice calls to automating phishing attacks at scale, this episode explores how hackers leverage technology using these tactics and what you can do to stay one step ahead.    Impactful Moments: 00:00 - Introduction 01:56 - Iain shares his journey with AI...2024-12-1225 minHacker Valley StudioHacker Valley StudioDo You Deserve To Be Hacked? Featuring Ilan Fehler and Dahvid SchlossDo you deserve to be hacked? With that bold tagline, CovertSwarm is pushing leaders to rethink how they test and defend their systems, and in this episode, they’re sharing firsthand how organizations can prepare for adversaries in the wild. Recorded at Black Hat 2024, Ron is joined by Ilan Fehler, US Sales Lead at CovertSwarm, and Dahvid Schloss, Hive Leader at CovertSwarm to explore the world of adversary emulation. From physical breaches to API exploits, this conversation covers the human, digital, and physical elements of cybersecurity. Impactful Moments: 00:00 - Introduction 01:25 - You Deserve To...2024-11-2640 minYou Deserve to be HackedYou Deserve to be HackedEpisode 33 - Inside the Breach: The Vulnerabilities Within Your PerimeterIn this episode hosted by Hacker Valley, Ron Eddings sits down with CovertSwarm's US team members Dahvid Schloss, Hive Leader, and Ilan Fehler, US Sales Lead, to uncover the hidden vulnerabilities most organizations overlook.While many focus on fortifying their outermost defenses, Dahvid and Ilan reveal why testing the entire brand is crucial to identifying vulnerabilities in the inner layers and building cyber-maturity within your organization. They'll dive into how adversaries exploit social, physical, and digital vectors to gain access and how CovertSwarm's approach emulates real-world cyber threats acting as real APTs against our clients....2024-11-2040 minYou Deserve to be HackedYou Deserve to be HackedEpisode 32 - Insights From A Former State-Sponsored HackerIn this episode, explore the most significant cyber threats impacting businesses today. From emerging risks to the persistent attack vectors that continue to catch companies off-guard, we’ll cover it all in a dynamic and insightful discussion.Join our host, Will Morrish, as he chats with Dahvid Schloss, Swarm Leader and former State-Sponsored Hacker, to unpack these critical topics and provide actionable insights on navigating the evolving cybersecurity landscape.-- Successful companies are constant targets for attackers. Those who take security seriously don’t test their defenses once a year. They...2024-10-1848 minYou Deserve to be HackedYou Deserve to be HackedEpisode 31 - CovertSwarm Academy: End of First YearJoin our host and Academy Hive Leader, Iain Jackson, as he sits down with Phill and Joao, members of the inaugural CovertSwarm Academy intake. In this episode, they reflect on their transformative journey and share insights from their successful first year at the Academy.-- Successful companies are constant targets for attackers. Those who take security seriously don’t test their defenses once a year. They subscribe to CovertSwarm.2024-09-2746 minYou Deserve to be HackedYou Deserve to be HackedEpisode 30 - DEF CON: Las Vegas SpecialEarlier this month, our Swarm of ethical hackers attended DEF CON 32 in Las Vegas, one of the most anticipated events in the hacking community.On this episode, join our Head of People and Culture and host, Ellie Lancaster, as she interviews our colleagues Faith, Alex, and Joao about their standout moments from the event. Learn about the different villages, topics, and levels needed to get the most out of DEF CON.#DEFCON #LasVegas-- Successful companies are constant targets for attackers. Those who take security seriously don’t test their defenses on...2024-08-2726 minYou Deserve to be HackedYou Deserve to be HackedEpisode 29 - DEF CON: Badge LifeThose of you at DEF CON 31 might remember the badges our swarm members had. Well, this year, we've got something even better!With DEF CON 32 around the corner, we are ready to introduce the team behind the awesome badge we will bring to the event.Meet our host and Head of People and Culture, Ellie Lancaster, as she discusses with Paul, John, and Ale the story behind this milestone they have achieved for the company.#BadgeLife-- Successful companies are constant targets for attackers. Those who...2024-07-2940 minYou Deserve to be HackedYou Deserve to be HackedEpisode 28 - From America's Insurance Capital: Let's Talk About FraudstersThe YOU DESERVE TO BE HACKED™ slogan has reached Hartford, the insurance capital of North America, to challenge the cybersecurity approach of CISOs in the industry.On this episode, listen to our host and CRO, Will Morrish, and Ilan Fehler, our first hired member in the US, as they explore the type of fraud companies are exposed to, what we have learned about the US market after last year's expansion, and how we challenge the questioned pen-testing approach offered by most cybersecurity vendors.Learn how our radical slogan has started to be heard everywhere and ho...2024-06-2825 minCode Bytes | Powered by Search 5.0Code Bytes | Powered by Search 5.0The Art of Saying No | Ronan Mccrory, Head of Product at CovertSwarmOn this episode of Code Bytes, Stephen is joined by Ronan Mccrory, Head of Product at CovertSwarm. In this episode, we explore Ronan’s journey from an attempted software engineer to a seasoned product manager in cybersecurity.Ronan highlights the importance of constant discovery and curiosity in product management, the need for a strong internal network for effective development, and the continuous learning required in the ever-changing field of cybersecurity.The pair discuss the innovative hiring practices CovertSwarm have, with their academy program, which brings in individuals from diverse backgrounds, including those outside tra...2024-06-2735 minYou Deserve to be HackedYou Deserve to be HackedEpisode 27 - Understanding DORA and NIS2Listen to our host and Swarm Director, Louis Blackburn, as he discusses with our new Hive Member, Ben Stickland, their interpretation of DORA (Digital Operational Resilience Act) and NIS2 (Network and Information Security Directive 2) and how they will help financial entities and critical infrastructure sectors to strengthen their cybersecurity posture.-- Successful companies are constant targets for attackers. Those who take security seriously don’t test their defenses once a year. They subscribe to CovertSwarm.2024-05-2232 minYou Deserve to be HackedYou Deserve to be HackedEpisode 26 - SwarmCon 7 at Bletchley ParkImmersed in the world of cryptography, WWII espionage and the remarkable story behind Alan Turing and his team's groundbreaking efforts to crack the Nazi encryption system, the Enigma code, our Swarm came from all over the world to share, learn and collaborate with each other.On this episode of our podcast, our host and new Head of People and Culture, Ellie Lancaster, talks to members of the CovertSwarm team to learn what they think were the highlights of our 7th SwarmCon event at Bletchley Park.-- Successful companies are...2024-04-3030 minYou Deserve to be HackedYou Deserve to be HackedEpisode 25 - Initial Access BrokersOn this episode meet our CEO, Anders Reeves, as he interviews Swarm Director, Louis Blackburn, on the topics of the 'Cyber Kill Chain' and how 'Initial Access Brokers' (IAB) play a key role in enabling mass negative impact by threat actors seeking to deploy Ransomware, and more.Watch on YouTube!-- Successful companies are constant targets for attackers. Those who take security seriously don’t test their defenses once a year. They subscribe to CovertSwarm.2024-03-2134 minYou Deserve to be HackedYou Deserve to be HackedEpisode 24 - The Red Teaming ParadigmListen to our COO Luke Potter and our new Swarm Director talking about red team services, how the industry looks and how to ensure you choose the perfect cybersecurity partner.-- Successful companies are constant targets for attackers. Those who take security seriously don’t test their defenses once a year. They subscribe to CovertSwarm.2024-02-2057 minYou Deserve to be HackedYou Deserve to be HackedEpisode 23 – New Cyber Maturity Rating FeatureOur Offensive Operations Center just received a major upgrade that will benefit all our users from January 2024.  Listen to our CEO Anders Reeves, our COO Luke Potter and our Head of Product Ronan Mccrory dive into this new feature, its functionality and how our clients could make the most of it to evaluate their cyber maturity benchmark beyond surface-level. -- Successful companies are constant targets for attackers. Those who take security seriously don’t test their defenses once a year. They subscribe to CovertSwarm.2024-01-2232 minYou Deserve to be HackedYou Deserve to be HackedEpisode 22 - Product Thinking in SecurityUnderstanding the user needs and translating them into a product strategy and road map is crucial to stay on top of other Attack Surface Management Platforms in a fast-moving industry such as cybersecurity.  Today’s host and COO, Luke Potter, talks with our new Head of Product, Ronan Mccrory, who discusses his industry experience and his thoughts on where the Offensive Operations Center is going. Learn how he plans to leverage his product knowledge to make impactful changes and bring CovertSwarm's offerings to a broader audience. -- Successful companies are constant targets for atta...2023-12-1938 minYou Deserve to be HackedYou Deserve to be HackedEpisode 21 - Transitioning from Bug Bounty to Constant Cyber AttackBug Bounty programmes can form an effective component of an organization's security strategy. However, they are prone to testing blindspots, variable quality, and uncertainty around tester skillsets and backgrounds.Join CovertSwarm COO, Luke Potter, as he interviews Ignacio Garrido on his move from working with popular Bug Bounty vendors over to joining our Swarm of ethical hackers full-time. Hear how his work delivering our Constant Cyber Attack service has changed his career and ability to deliver greater levels of client value each and every day through deeper cyber testing engagements founded upon context-aware relationships.2023-11-2136 minYou Deserve to be HackedYou Deserve to be HackedEpisode 20– From Punk to Cyber with Chris EdkinsEarlier this year Chris joined CovertSwarm having taken an unusual and inspiring route into offensive cyber security from being a  member of a successful punk and metal band, through to a prolific music production career, and more recently seeing him join  the world of cyber security.Hear Chris' story and how 17 years of music performance, production and set of highly-transferrable skills led to a career in cyber, and to him joining as part of the Swarm.Links to some of the music Chris was involved in producing and that is mentioned in this episode can be...2023-10-2529 minYou Deserve to be HackedYou Deserve to be HackedEpisode 19 – The CovertSwarm AcademyThe mission of the CovertSwarm Academy is to build a new and alternative pathway for people into the cyber industry that removes the traditional barriers to entry by increasing accessibility to a more diverse population. On this episode hear our founder, Anders Reeves, speak with Iain and Jack from the CovertSwarm team leading the design, implementation, launch and operation of the CovertSwarm Academy. Learn more about the 'why' behind the CovertSwarm Academy, and how its alternative approach to attracting people from diverse socio-economic backgrounds, levels of education, and geographies has already resulted in an application...2023-09-2943 minYou Deserve to be HackedYou Deserve to be HackedEpisode 18 – The moving security goalpost with security expert and award-winning cyber author Todd Wade.CovertSwarm’s Will Morrish is joined by Todd Wade to discuss the evolving risk of AI, making security personal, and how to engage your teams in a security journey.-- Successful companies are constant targets for attackers. Those who take security seriously don’t test their defenses once a year. They subscribe to CovertSwarm.2023-08-2134 minYou Deserve to be HackedYou Deserve to be HackedEpisode 17 – DEF CON 2023 Special, live from BrewDog Las VegasToday we are bringing a very special episode, recorded live in Las Vegas at DEF CON 31.Hosted by CovertSwarm founder & CEO, Anders Reeves, hear him and many from the Swarm as they discuss this year's DEF CON event. Featuring, this year's CovertSwarm badge; insights; reviews on talks; tips if it's your first trip to DEF CON, and much more!To join the Swarm why not visit our website - www.CovertSwarm.com-- Successful companies are constant targets for attackers. Those who take security seriously don’t test their defenses once a...2023-08-1320 minYou Deserve to be HackedYou Deserve to be HackedEpisode 16 - Challenging the Attack Surface Management industry with special guest Adam GovierLuke Potter interviews Adam Govier, Lead Developer of CovertSwarm's Offensive Operations Center platform.Previously only accessible to its subscription clients, July's public-release of CovertSwarm's Offensive Operations Center caters for the comprehensive offensive security needs of organizations ranging from single-domained businesses through to global enterprises.In this in-depth and behind the scenes conversation Luke and Adam explore the Attack Surface Management industry, explain what it is, why it exists...and how it is ripe for disruption via the FREE access to cyber insights that CovertSwarm's Offensive Operations Center SaaS platform delivers.For  instant access t...2023-07-2434 minYou Deserve to be HackedYou Deserve to be HackedEpisode 15 - Information Security Management with special guest Frankie Gallop from ProventionHaving started in the cyber security industry at just 16 years of age, our special guest Frankie Gallop shares her thoughts, insights and experiences of the rapid changes occurring within the domain these past 5 years.Discussing how to approach, build and deploy an effective security programme, and sharing the number 1 security risk in practically every business today, listen to Frankie describe the importance of training your people, and how the emergence of mass-market AI is likely to impact your security posture.-- Successful companies are constant targets for attackers. Those who take security seriously...2023-06-2031 minYou Deserve to be HackedYou Deserve to be HackedEpisode 14 - Threat Intelligence with special guest Haroon MahmoodCovertSwarm's COO, Luke Potter, welcomes returning guest Haroon Mahmood to this episode of our podcast focusing on the many aspects necessary to gain and employ insights derived from Threat Intelligence (TI). Learn how best to identify, report and take action on threats with expert opinion and advice from Haroon.-- Successful companies are constant targets for attackers. Those who take security seriously don’t test their defenses once a year. They subscribe to CovertSwarm.2023-05-2330 min