
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer.
Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated.
Each episode dives into practical security lessons, covering attack chains and creative exploit... more
| Publishes | Monthly | Episodes | 14 | Founded | 9 months ago |
|---|---|---|---|---|---|
| Number of Listeners | Categories | TechnologyCareersBusiness | |||

One misbound identity. One exposed internal path. Two routes to total compromise.
In this season finale of Hacked & Secured: Pentest Exploits & Mitigations, we break down two real-world findings that show how small trust assumptions can unravel enti... more
A few microseconds. One silent browser session. That’s all it took for attackers to break into systems without tripping a single alert.
In this episode of Hacked & Secured: Pentest Exploits & Mitigations, we explore two subtle but devastating flaws:... more
One flawed password reset. One shared session token. One dangerous object.
In Episode 11 of Hacked & Secured: Pentest Exploits & Mitigations, we break down three real-world vulnerabilities where trust between systems and users broke down—with seriou... more
One cookie set on a subdomain triggered XSS and stole session tokens. One fake image upload gave the attacker a reverse shell.
This episode breaks down two powerful exploits—a cookie-based XSS that bypassed frontend protections, and an RCE through G... more
People also subscribe to these shows.

This podcast is a fantastic listen for anyone interested in cybersecurity and penetration testing. The way complex topics are broken down makes it accessible while still being insightful for those with experience in the field. You can tell the host is passionate and knowledgeable, making each episode engaging and informative. Highly recommended for anyone curious about ethical hacking and security!
Insightful and well-structured, with valuable knowledge for developers and pentesters.
Key themes from listener reviews, highlighting what works and what could be improved about the show.
How this podcast ranks in the Apple Podcasts, Spotify and YouTube charts.
Apple Podcasts | #165 |
Listeners, social reach, demographics and more for this podcast.
| Listeners per Episode | Gender Skew | Location | |||
|---|---|---|---|---|---|
| Interests | Professions | Age Range | |||
| Household Income | Social Media Reach | ||||
The content centers around the analysis of real-world penetration testing exploits and security vulnerabilities, emphasizing the technical aspects of identifying and mitigating these risks. Episodes cover a wide range of issues such as insecure application designs, flaws in security implementations, and case studies providing actionable insights for professionals in cybersecurity fields. By presenting both common and obscure vulnerabilities, the discussions aim to enhance the understanding of ethical hacking, bolstering the capabilities of listeners whether they are pentesters, developers, or security engineers. Notably, the podcast encourages listener engagement by inviting submissions of pentesting findings, fostering a community around s... more
Rephonic provides a wide range of podcast stats for this podcast. We scanned the web and collated all of the information that we could find in our comprehensive podcast database. See how many people listen to this podcast and access YouTube viewership numbers, download stats, audience demographics, chart rankings, ratings, reviews and more.
Rephonic provides a full set of podcast information for three million podcasts, including the number of listeners. View further listenership figures for this podcast, including podcast download numbers and subscriber numbers, so you can make better decisions about which podcasts to sponsor or be a guest on. You will need to upgrade your account to access this premium data.
Rephonic provides comprehensive predictive audience data for this podcast, including gender skew, age, country, political leaning, income, professions, education level, and interests. You can access these listener demographics by upgrading your account.
To see how many followers or subscribers this podcast has on Spotify and other platforms such as Castbox and Podcast Addict, simply upgrade your account. You'll also find viewership figures for their YouTube channel if they have one.
These podcasts share a similar audience with this podcast:
1. Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
this podcast launched 9 months ago and published 14 episodes to date. You can find more information about this podcast including rankings, audience demographics and engagement in our podcast database.
Our systems regularly scour the web to find email addresses and social media links for this podcast. We scanned the web and collated all of the contact information that we could find in our podcast database. But in the unlikely event that you can't find what you're looking for, our concierge service lets you request our research team to source better contacts for you.
Rephonic pulls ratings and reviews for this podcast from multiple sources, including Spotify, Apple Podcasts, Castbox, and Podcast Addict.
View all the reviews in one place instead of visiting each platform individually and use this information to decide if a show is worth pitching or not.
Rephonic provides full transcripts for episodes of this podcast. Search within each transcript for your keywords, whether they be topics, brands or people, and figure out if it's worth pitching as a guest or sponsor. You can even set-up alerts to get notified when your keywords are mentioned.
Recent guests on this podcast include:
1. Amit Dota
2. Victor Hanna
To view more recent guests and their details, simply upgrade your Rephonic account. You'll also get access to a typical guest profile to help you decide if the show is worth pitching.