<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet href="/stylesheet.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link rel="self" type="application/rss+xml" href="https://feeds.transistor.fm/antisyphon-training-anticasts" title="MP3 Audio"/>
    <atom:link rel="hub" href="https://pubsubhubbub.appspot.com/"/>
    <podcast:podping usesPodping="true"/>
    <title>Antisyphon Training Anticasts</title>
    <generator>Transistor (https://transistor.fm)</generator>
    <itunes:new-feed-url>https://feeds.transistor.fm/antisyphon-training-anticasts</itunes:new-feed-url>
    <description>Podcast audio-only versions of weekly webcasts from Antisyphon Training</description>
    <copyright>© 2026 Antisyphon Training</copyright>
    <podcast:guid>9529eb99-9012-5948-9d65-646598a6eb92</podcast:guid>
    <podcast:podroll>
      <podcast:remoteItem feedGuid="0543e6d6-b875-52ac-bb17-d2b531254cfe" feedUrl="https://feeds.transistor.fm/ai-security-ops"/>
      <podcast:remoteItem feedGuid="7009cf9d-3ce4-5dc6-8ada-5fc1dabb887b" feedUrl="https://feeds.transistor.fm/talkin-bout-infosec-news"/>
      <podcast:remoteItem feedGuid="d7087d50-12f3-5e72-af9d-040f7921f47d" feedUrl="https://feeds.transistor.fm/bhis-webcasts"/>
    </podcast:podroll>
    <podcast:locked>yes</podcast:locked>
    <language>en</language>
    <pubDate>Fri, 08 May 2026 08:00:13 -0400</pubDate>
    <lastBuildDate>Fri, 08 May 2026 08:02:01 -0400</lastBuildDate>
    <image>
      <url>https://img.transistorcdn.com/dL-QZpO6yq1m9dJJXLsTiSjL3eTr_YhHlHwA__-1XqA/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xZDlh/OGUwM2FhMmM5ZTQ5/YTA0MDI3ZjI0NGM5/ZmNlMS5wbmc.jpg</url>
      <title>Antisyphon Training Anticasts</title>
    </image>
    <itunes:category text="Education">
      <itunes:category text="Courses"/>
    </itunes:category>
    <itunes:category text="Technology"/>
    <itunes:type>episodic</itunes:type>
    <itunes:author>Antisyphon Training</itunes:author>
    <itunes:image href="https://img.transistorcdn.com/dL-QZpO6yq1m9dJJXLsTiSjL3eTr_YhHlHwA__-1XqA/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xZDlh/OGUwM2FhMmM5ZTQ5/YTA0MDI3ZjI0NGM5/ZmNlMS5wbmc.jpg"/>
    <itunes:summary>Podcast audio-only versions of weekly webcasts from Antisyphon Training</itunes:summary>
    <itunes:subtitle>Podcast audio-only versions of weekly webcasts from Antisyphon Training.</itunes:subtitle>
    <itunes:keywords></itunes:keywords>
    <itunes:owner>
      <itunes:name>Antisyphon Training</itunes:name>
      <itunes:email>marketing@blackhillsinfosec.com</itunes:email>
    </itunes:owner>
    <itunes:complete>No</itunes:complete>
    <itunes:explicit>No</itunes:explicit>
    <item>
      <title>Turn Ideas into Code with GitHub Copilot with Carrie Roberts</title>
      <itunes:episode>13</itunes:episode>
      <podcast:episode>13</podcast:episode>
      <itunes:title>Turn Ideas into Code with GitHub Copilot with Carrie Roberts</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5ac573aa-035e-4750-b3cc-94878341601c</guid>
      <link>https://share.transistor.fm/s/9eb76ea7</link>
      <description>
        <![CDATA[<p>What if you could build tools, automate tasks, and write real code without ever having called yourself a developer?</p><p>Join us for a free one-hour training session with instructor Carrie Roberts, Developer and InfoSec Engineer, as she teaches you how GitHub Copilot is changing what it means to "know how to code" and show you how to put it to work in your browser right now, with no setup required.</p><p>You'll learn how to use Copilot to generate, debug, and refactor code through hands-on demos, including how to assign tasks directly from GitHub without ever opening an editor, so you can start building things that actually work faster than you ever thought possible.</p><p>📚 Train with Carrie Roberts<br><a href="https://www.antisyphontraining.com/product/powershell-for-infosec-what-you-need-to-know-with-carrie-roberts/">https://www.antisyphontraining.com/product/powershell-for-infosec-what-you-need-to-know-with-carrie-roberts/</a></p><p><strong>Chapters</strong><br></p><ul><li>(00:00) - Introduction &amp; What is GitHub Copilot</li>
<li>(05:17) - How Copilot Works (Concept + Setup)</li>
<li>(11:27) - Prompting Strategies for Better Results</li>
<li>(15:49) - Turning Ideas into Code (Workflow)</li>
<li>(23:53) - Debugging, Limitations &amp; Security</li>
<li>(36:11) - Q&amp;A</li>
</ul><br><strong>Credits</strong><br><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://anticasts.transistor.fm/people/ryan-poirier">Ryan Poirier</a> - Producer</li>
  <li><a href="https://anticasts.transistor.fm/people/carrie-roberts">Carrie Roberts</a> - Guest</li>
</ul><br><strong>Chat with your fellow attendees in the BHIS Discord server:</strong><br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>in the #🔴live-chat channel<p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </strong><br><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p><strong><a href="https://www.youtube.com/watch?v=N6jUEKB9QYU" title="Click here to watch a video of this episode.">Click here to watch a video of this episode.</a><br>
</strong></p><p>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p><p><a href="https://share.transistor.fm/s/9eb76ea7/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>What if you could build tools, automate tasks, and write real code without ever having called yourself a developer?</p><p>Join us for a free one-hour training session with instructor Carrie Roberts, Developer and InfoSec Engineer, as she teaches you how GitHub Copilot is changing what it means to "know how to code" and show you how to put it to work in your browser right now, with no setup required.</p><p>You'll learn how to use Copilot to generate, debug, and refactor code through hands-on demos, including how to assign tasks directly from GitHub without ever opening an editor, so you can start building things that actually work faster than you ever thought possible.</p><p>📚 Train with Carrie Roberts<br><a href="https://www.antisyphontraining.com/product/powershell-for-infosec-what-you-need-to-know-with-carrie-roberts/">https://www.antisyphontraining.com/product/powershell-for-infosec-what-you-need-to-know-with-carrie-roberts/</a></p><p><strong>Chapters</strong><br></p><ul><li>(00:00) - Introduction &amp; What is GitHub Copilot</li>
<li>(05:17) - How Copilot Works (Concept + Setup)</li>
<li>(11:27) - Prompting Strategies for Better Results</li>
<li>(15:49) - Turning Ideas into Code (Workflow)</li>
<li>(23:53) - Debugging, Limitations &amp; Security</li>
<li>(36:11) - Q&amp;A</li>
</ul><br><strong>Credits</strong><br><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://anticasts.transistor.fm/people/ryan-poirier">Ryan Poirier</a> - Producer</li>
  <li><a href="https://anticasts.transistor.fm/people/carrie-roberts">Carrie Roberts</a> - Guest</li>
</ul><br><strong>Chat with your fellow attendees in the BHIS Discord server:</strong><br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>in the #🔴live-chat channel<p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </strong><br><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p><strong><a href="https://www.youtube.com/watch?v=N6jUEKB9QYU" title="Click here to watch a video of this episode.">Click here to watch a video of this episode.</a><br>
</strong></p><p>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p><p><a href="https://share.transistor.fm/s/9eb76ea7/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </content:encoded>
      <pubDate>Fri, 08 May 2026 08:00:00 -0400</pubDate>
      <author>Antisyphon Training</author>
      <enclosure url="https://media.transistor.fm/9eb76ea7/b8e4946f.mp3" length="66863503" type="audio/mpeg"/>
      <podcast:alternateEnclosure type="application/x-mpegURL" length="0" bitrate="2600323" height="1080" lang="en" title="HD Video Stream" rel="alternate">
        <podcast:source uri="https://media.transistor.fm/9eb76ea7/b8e4946f.m3u8"/>
      </podcast:alternateEnclosure>
      <itunes:author>Antisyphon Training</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/Ut5kOl6j75iPqProlc4u1BmUnLVg080fhPGshlclRKo/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81OTU1/YjIzNGY5MGFhNmIw/MTEzNmFiOGIyNzE2/OGRlZS5wbmc.jpg"/>
      <itunes:duration>4176</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>What if you could build tools, automate tasks, and write real code without ever having called yourself a developer?</p><p>Join us for a free one-hour training session with instructor Carrie Roberts, Developer and InfoSec Engineer, as she teaches you how GitHub Copilot is changing what it means to "know how to code" and show you how to put it to work in your browser right now, with no setup required.</p><p>You'll learn how to use Copilot to generate, debug, and refactor code through hands-on demos, including how to assign tasks directly from GitHub without ever opening an editor, so you can start building things that actually work faster than you ever thought possible.</p><p>📚 Train with Carrie Roberts<br><a href="https://www.antisyphontraining.com/product/powershell-for-infosec-what-you-need-to-know-with-carrie-roberts/">https://www.antisyphontraining.com/product/powershell-for-infosec-what-you-need-to-know-with-carrie-roberts/</a></p><p><strong>Chapters</strong><br></p><ul><li>(00:00) - Introduction &amp; What is GitHub Copilot</li>
<li>(05:17) - How Copilot Works (Concept + Setup)</li>
<li>(11:27) - Prompting Strategies for Better Results</li>
<li>(15:49) - Turning Ideas into Code (Workflow)</li>
<li>(23:53) - Debugging, Limitations &amp; Security</li>
<li>(36:11) - Q&amp;A</li>
</ul><br><strong>Credits</strong><br><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://anticasts.transistor.fm/people/ryan-poirier">Ryan Poirier</a> - Producer</li>
  <li><a href="https://anticasts.transistor.fm/people/carrie-roberts">Carrie Roberts</a> - Guest</li>
</ul><br><strong>Chat with your fellow attendees in the BHIS Discord server:</strong><br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>in the #🔴live-chat channel<p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </strong><br><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p><strong><a href="https://www.youtube.com/watch?v=N6jUEKB9QYU" title="Click here to watch a video of this episode.">Click here to watch a video of this episode.</a><br>
</strong></p><p>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p><p><a href="https://share.transistor.fm/s/9eb76ea7/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Producer" href="https://anticasts.transistor.fm/people/ryan-poirier">Ryan Poirier</podcast:person>
      <podcast:person role="Guest" href="https://www.antisyphontraining.com/instructor/carrie-roberts/" img="https://img.transistorcdn.com/2w8p1U3uW-OeIuZSLsT4hYmem73-XeYRsxC0BzhjLWM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jZDk4/MWRmYTBmNjA3NDQ5/ZTgzZjg4OWZkNWEx/MmY2NC5qcGc.jpg">Carrie Roberts</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/9eb76ea7/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/9eb76ea7/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/9eb76ea7/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/9eb76ea7/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/9eb76ea7/transcription" type="text/html"/>
      <podcast:chapters url="https://share.transistor.fm/s/9eb76ea7/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>The Absolute Truths of Cybersecurity with Doc Blackburn</title>
      <itunes:episode>12</itunes:episode>
      <podcast:episode>12</podcast:episode>
      <itunes:title>The Absolute Truths of Cybersecurity with Doc Blackburn</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1ac1b4cc-e749-4d74-be74-5910cfc0fc3b</guid>
      <link>https://share.transistor.fm/s/100c94fc</link>
      <description>
        <![CDATA[<p>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – <br><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p>DANGER AHEAD.</p><p>In this bold, no-nonsense talk, instructor Doc Blackburn will reveal the Absolute Truths of Cybersecurity, hard realities that challenge everything you think you know about “being secure.”</p><p>🛝 Webcast Slides -  <br><a href="https://www.antisyphontraining.com/wp-content/uploads/2026/04/Absolute-Truths.pdf">https://www.antisyphontraining.com/wp-content/uploads/2026/04/Absolute-Truths.pdf</a></p><p>Join us for a free one-hour training session to learn why security isn’t a product, why prevention is a fantasy, why encryption fixes almost nothing, and why your biggest risk might be you.</p><p>You'll learn to see your role differently — not as a gatekeeper, but as a mission-enabler, risk translator, and resilience builder.</p><p>This Anti-Cast isn’t about firewalls or frameworks. It’s a total reset on how we view cybersecurity.<br><strong>Chapters</strong><br></p><ul><li>(00:00) - Intro - The Absolute Truths of Cybersecurity with Doc Blackburn</li>
<li>(03:40) - Vera's Origin Story</li>
<li>(08:19) - Learning Security?</li>
<li>(10:08) - Security isn’t what you do!</li>
<li>(11:17) - 14 Truths of Cybersecurity</li>
<li>(12:59) - Truth #1: There is no such thing as security, only varying degrees of insecurity.</li>
<li>(15:26) - Truth #2: The network doesn't exist to be secured.</li>
<li>(21:29) - Truth #3: When security gets in the way of the mission – Security is wrong, not the mission</li>
<li>(22:54) - Truth #4: Prevention is ideal – Detection is a must. Detection without response is useless</li>
<li>(28:43) - Truth #5: Security must always be driven by business need</li>
<li>(31:04) - Truth #6: Security is a cost center, not a profit center</li>
<li>(34:04) - Truth #7: Security is a process… not a product</li>
<li>(35:58) - Truth #8: You cannot process encrypted data… EVER</li>
<li>(38:42) - Truth #9: All good security is custom-fit Compliance does not equal security</li>
<li>(44:28) - Truth #10: In security, the most dangerous thing in the world is what you think you know.</li>
<li>(47:14) - Truth #11: You cannot secure what you do not control</li>
<li>(49:49) - Truth #12: You cannot prevent what you allow</li>
<li>(51:02) - Truth #13: Security is, first and foremost, a people issue</li>
<li>(53:24) - Truth #14: Some things cannot be fixed They are simply reality</li>
<li>(59:11) - WORKSHOP: How to think like a Cybersecurity Defender</li>
</ul><br><strong>Credits</strong><br><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://anticasts.transistor.fm/people/ryan-poirier">Ryan Poirier</a> - Producer</li>
  <li><a href="https://anticasts.transistor.fm/people/doc-blackburn">Doc Blackburn</a> - Guest</li>
  <li><a href="https://anticasts.transistor.fm/people/bronwen-aker">Bronwen Aker</a> - Guest</li>
  <li><a href="https://anticasts.transistor.fm/people/mark-williams">Mark Williams</a> - Guest</li>
</ul><br><strong>Chat with your fellow attendees in the BHIS Discord server:</strong><br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>in the #🔴live-chat channel<p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </strong><br><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p><strong><a href="https://www.youtube.com/watch?v=OjqWjHoOOtg" title="Click here to watch a video of this episode.">Click here to watch a video of this episode.</a><br>
</strong></p><p>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p><p><a href="https://share.transistor.fm/s/100c94fc/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – <br><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p>DANGER AHEAD.</p><p>In this bold, no-nonsense talk, instructor Doc Blackburn will reveal the Absolute Truths of Cybersecurity, hard realities that challenge everything you think you know about “being secure.”</p><p>🛝 Webcast Slides -  <br><a href="https://www.antisyphontraining.com/wp-content/uploads/2026/04/Absolute-Truths.pdf">https://www.antisyphontraining.com/wp-content/uploads/2026/04/Absolute-Truths.pdf</a></p><p>Join us for a free one-hour training session to learn why security isn’t a product, why prevention is a fantasy, why encryption fixes almost nothing, and why your biggest risk might be you.</p><p>You'll learn to see your role differently — not as a gatekeeper, but as a mission-enabler, risk translator, and resilience builder.</p><p>This Anti-Cast isn’t about firewalls or frameworks. It’s a total reset on how we view cybersecurity.<br><strong>Chapters</strong><br></p><ul><li>(00:00) - Intro - The Absolute Truths of Cybersecurity with Doc Blackburn</li>
<li>(03:40) - Vera's Origin Story</li>
<li>(08:19) - Learning Security?</li>
<li>(10:08) - Security isn’t what you do!</li>
<li>(11:17) - 14 Truths of Cybersecurity</li>
<li>(12:59) - Truth #1: There is no such thing as security, only varying degrees of insecurity.</li>
<li>(15:26) - Truth #2: The network doesn't exist to be secured.</li>
<li>(21:29) - Truth #3: When security gets in the way of the mission – Security is wrong, not the mission</li>
<li>(22:54) - Truth #4: Prevention is ideal – Detection is a must. Detection without response is useless</li>
<li>(28:43) - Truth #5: Security must always be driven by business need</li>
<li>(31:04) - Truth #6: Security is a cost center, not a profit center</li>
<li>(34:04) - Truth #7: Security is a process… not a product</li>
<li>(35:58) - Truth #8: You cannot process encrypted data… EVER</li>
<li>(38:42) - Truth #9: All good security is custom-fit Compliance does not equal security</li>
<li>(44:28) - Truth #10: In security, the most dangerous thing in the world is what you think you know.</li>
<li>(47:14) - Truth #11: You cannot secure what you do not control</li>
<li>(49:49) - Truth #12: You cannot prevent what you allow</li>
<li>(51:02) - Truth #13: Security is, first and foremost, a people issue</li>
<li>(53:24) - Truth #14: Some things cannot be fixed They are simply reality</li>
<li>(59:11) - WORKSHOP: How to think like a Cybersecurity Defender</li>
</ul><br><strong>Credits</strong><br><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://anticasts.transistor.fm/people/ryan-poirier">Ryan Poirier</a> - Producer</li>
  <li><a href="https://anticasts.transistor.fm/people/doc-blackburn">Doc Blackburn</a> - Guest</li>
  <li><a href="https://anticasts.transistor.fm/people/bronwen-aker">Bronwen Aker</a> - Guest</li>
  <li><a href="https://anticasts.transistor.fm/people/mark-williams">Mark Williams</a> - Guest</li>
</ul><br><strong>Chat with your fellow attendees in the BHIS Discord server:</strong><br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>in the #🔴live-chat channel<p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </strong><br><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p><strong><a href="https://www.youtube.com/watch?v=OjqWjHoOOtg" title="Click here to watch a video of this episode.">Click here to watch a video of this episode.</a><br>
</strong></p><p>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p><p><a href="https://share.transistor.fm/s/100c94fc/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </content:encoded>
      <pubDate>Fri, 01 May 2026 14:32:02 -0400</pubDate>
      <author>Antisyphon Training</author>
      <enclosure url="https://media.transistor.fm/100c94fc/2329f330.mp3" length="63751351" type="audio/mpeg"/>
      <podcast:alternateEnclosure type="application/x-mpegURL" length="0" bitrate="3491899" height="1080" lang="en" title="HD Video Stream" rel="alternate">
        <podcast:source uri="https://media.transistor.fm/100c94fc/2329f330.m3u8"/>
      </podcast:alternateEnclosure>
      <itunes:author>Antisyphon Training</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/ww_VrKfg13g1sE-wyv0A0oNB7D9QRYRZPcl8UH96eQI/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81YTky/MTgwZmI4MmM0YzIz/NTJkYTM1ZGY5NzNj/OTAwZC5wbmc.jpg"/>
      <itunes:duration>3981</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – <br><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p>DANGER AHEAD.</p><p>In this bold, no-nonsense talk, instructor Doc Blackburn will reveal the Absolute Truths of Cybersecurity, hard realities that challenge everything you think you know about “being secure.”</p><p>🛝 Webcast Slides -  <br><a href="https://www.antisyphontraining.com/wp-content/uploads/2026/04/Absolute-Truths.pdf">https://www.antisyphontraining.com/wp-content/uploads/2026/04/Absolute-Truths.pdf</a></p><p>Join us for a free one-hour training session to learn why security isn’t a product, why prevention is a fantasy, why encryption fixes almost nothing, and why your biggest risk might be you.</p><p>You'll learn to see your role differently — not as a gatekeeper, but as a mission-enabler, risk translator, and resilience builder.</p><p>This Anti-Cast isn’t about firewalls or frameworks. It’s a total reset on how we view cybersecurity.<br><strong>Chapters</strong><br></p><ul><li>(00:00) - Intro - The Absolute Truths of Cybersecurity with Doc Blackburn</li>
<li>(03:40) - Vera's Origin Story</li>
<li>(08:19) - Learning Security?</li>
<li>(10:08) - Security isn’t what you do!</li>
<li>(11:17) - 14 Truths of Cybersecurity</li>
<li>(12:59) - Truth #1: There is no such thing as security, only varying degrees of insecurity.</li>
<li>(15:26) - Truth #2: The network doesn't exist to be secured.</li>
<li>(21:29) - Truth #3: When security gets in the way of the mission – Security is wrong, not the mission</li>
<li>(22:54) - Truth #4: Prevention is ideal – Detection is a must. Detection without response is useless</li>
<li>(28:43) - Truth #5: Security must always be driven by business need</li>
<li>(31:04) - Truth #6: Security is a cost center, not a profit center</li>
<li>(34:04) - Truth #7: Security is a process… not a product</li>
<li>(35:58) - Truth #8: You cannot process encrypted data… EVER</li>
<li>(38:42) - Truth #9: All good security is custom-fit Compliance does not equal security</li>
<li>(44:28) - Truth #10: In security, the most dangerous thing in the world is what you think you know.</li>
<li>(47:14) - Truth #11: You cannot secure what you do not control</li>
<li>(49:49) - Truth #12: You cannot prevent what you allow</li>
<li>(51:02) - Truth #13: Security is, first and foremost, a people issue</li>
<li>(53:24) - Truth #14: Some things cannot be fixed They are simply reality</li>
<li>(59:11) - WORKSHOP: How to think like a Cybersecurity Defender</li>
</ul><br><strong>Credits</strong><br><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://anticasts.transistor.fm/people/ryan-poirier">Ryan Poirier</a> - Producer</li>
  <li><a href="https://anticasts.transistor.fm/people/doc-blackburn">Doc Blackburn</a> - Guest</li>
  <li><a href="https://anticasts.transistor.fm/people/bronwen-aker">Bronwen Aker</a> - Guest</li>
  <li><a href="https://anticasts.transistor.fm/people/mark-williams">Mark Williams</a> - Guest</li>
</ul><br><strong>Chat with your fellow attendees in the BHIS Discord server:</strong><br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>in the #🔴live-chat channel<p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </strong><br><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p><strong><a href="https://www.youtube.com/watch?v=OjqWjHoOOtg" title="Click here to watch a video of this episode.">Click here to watch a video of this episode.</a><br>
</strong></p><p>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p><p><a href="https://share.transistor.fm/s/100c94fc/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Producer" href="https://anticasts.transistor.fm/people/ryan-poirier">Ryan Poirier</podcast:person>
      <podcast:person role="Guest" href="https://www.antisyphontraining.com/instructor/docblackburn/" img="https://img.transistorcdn.com/bJJ1jqtCpizE9P-T0CsZbN7KHVhTFLx0bGSwaVFohIA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83NWY2/YzU0NTFhMjEzNDZh/ZTljZTIwYTMwZDVi/ZTQ5ZS5qcGVn.jpg">Doc Blackburn</podcast:person>
      <podcast:person role="Guest" href="https://www.blackhillsinfosec.com/team/bronwen-aker/" img="https://img.transistorcdn.com/xOUFrnSRlt5y8HFWaxDxVKRD8buh4M90fSv6oqmt9g4/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85OWMz/NzgwZjMwYWFhMzEy/MzJiMTc0YTg5MjQ3/YWY2Ni5qcGc.jpg">Bronwen Aker</podcast:person>
      <podcast:person role="Guest" href="https://anticasts.transistor.fm/people/mark-williams">Mark Williams</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/100c94fc/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/100c94fc/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/100c94fc/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/100c94fc/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/100c94fc/transcription" type="text/html"/>
      <podcast:chapters url="https://share.transistor.fm/s/100c94fc/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>How to Write SOC Tickets That Build Trust and Drive Action w/ Dan Rearden</title>
      <itunes:episode>11</itunes:episode>
      <podcast:episode>11</podcast:episode>
      <itunes:title>How to Write SOC Tickets That Build Trust and Drive Action w/ Dan Rearden</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">054ac15e-ae14-49ed-b3e0-2cb662fbc3a0</guid>
      <link>https://share.transistor.fm/s/a36f24c3</link>
      <description>
        <![CDATA[<p>What does the ideal SOC ticket look like?</p><p>🛝 Webcast Slides -  <br><a href="https://www.antisyphontraining.com/wp-content/uploads/2026/03/How-to-Write-SOC-Tickets-That-Build-Trust-and-Drive-Action.pdf">https://www.antisyphontraining.com/wp-content/uploads/2026/03/How-to-Write-SOC-Tickets-That-Build-Trust-and-Drive-Action.pdf </a></p><p>Technical skills matter, but clear communication is just as important.</p><p>Join SOC Analyst Dan Rearden for a free one-hour Antisyphon Anti-cast on using soft skills to level up your tickets.</p><p>Learn how to make alerts clear, findings impactful, and documentation useful now and later.</p><p><strong>Chapters</strong><br></p><ul><li>(00:00) - Intro- How to Write SOC Tickets That Build Trust and Drive Action - Dan Rearden</li>
<li>(01:53) - About Dan Rearden</li>
<li>(03:27) - On Call at 2AM...</li>
<li>(05:16) - Beyond the Terminal</li>
<li>(06:22) - Talking to Humans</li>
<li>(09:11) - Reboot Your Vocabulary</li>
<li>(14:44) - Plain Text Protocol</li>
<li>(19:54) - Peer To Peer</li>
<li>(24:44) - The Client Session</li>
<li>(26:06) - The Client Session</li>
<li>(28:13) - Hotfix today</li>
<li>(31:53) - Final System Check</li>
<li>(34:32) - Q&amp;A</li>
</ul><br><strong>Credits</strong><br><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://anticasts.transistor.fm/people/meagan-bentley">Meagan Bentley</a> - Producer</li>
  <li><a href="https://anticasts.transistor.fm/people/cj-cox">CJ Cox</a> - Guest</li>
  <li><a href="https://anticasts.transistor.fm/people/ryan-poirier">Ryan Poirier</a> - Producer</li>
  <li><a href="https://anticasts.transistor.fm/people/dan-rearden-haircutfish">Dan Rearden (Haircutfish)</a> - Guest</li>
</ul><br><strong>Chat with your fellow attendees in the BHIS Discord server:</strong><br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>in the #🔴live-chat channel<p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </strong><br><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p><strong><a href="https://www.youtube.com/watch?v=12ldaGyh7f0" title="Click here to watch a video of this episode.">Click here to watch a video of this episode.</a><br>
</strong></p><p>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p><p><a href="https://share.transistor.fm/s/a36f24c3/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>What does the ideal SOC ticket look like?</p><p>🛝 Webcast Slides -  <br><a href="https://www.antisyphontraining.com/wp-content/uploads/2026/03/How-to-Write-SOC-Tickets-That-Build-Trust-and-Drive-Action.pdf">https://www.antisyphontraining.com/wp-content/uploads/2026/03/How-to-Write-SOC-Tickets-That-Build-Trust-and-Drive-Action.pdf </a></p><p>Technical skills matter, but clear communication is just as important.</p><p>Join SOC Analyst Dan Rearden for a free one-hour Antisyphon Anti-cast on using soft skills to level up your tickets.</p><p>Learn how to make alerts clear, findings impactful, and documentation useful now and later.</p><p><strong>Chapters</strong><br></p><ul><li>(00:00) - Intro- How to Write SOC Tickets That Build Trust and Drive Action - Dan Rearden</li>
<li>(01:53) - About Dan Rearden</li>
<li>(03:27) - On Call at 2AM...</li>
<li>(05:16) - Beyond the Terminal</li>
<li>(06:22) - Talking to Humans</li>
<li>(09:11) - Reboot Your Vocabulary</li>
<li>(14:44) - Plain Text Protocol</li>
<li>(19:54) - Peer To Peer</li>
<li>(24:44) - The Client Session</li>
<li>(26:06) - The Client Session</li>
<li>(28:13) - Hotfix today</li>
<li>(31:53) - Final System Check</li>
<li>(34:32) - Q&amp;A</li>
</ul><br><strong>Credits</strong><br><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://anticasts.transistor.fm/people/meagan-bentley">Meagan Bentley</a> - Producer</li>
  <li><a href="https://anticasts.transistor.fm/people/cj-cox">CJ Cox</a> - Guest</li>
  <li><a href="https://anticasts.transistor.fm/people/ryan-poirier">Ryan Poirier</a> - Producer</li>
  <li><a href="https://anticasts.transistor.fm/people/dan-rearden-haircutfish">Dan Rearden (Haircutfish)</a> - Guest</li>
</ul><br><strong>Chat with your fellow attendees in the BHIS Discord server:</strong><br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>in the #🔴live-chat channel<p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </strong><br><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p><strong><a href="https://www.youtube.com/watch?v=12ldaGyh7f0" title="Click here to watch a video of this episode.">Click here to watch a video of this episode.</a><br>
</strong></p><p>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p><p><a href="https://share.transistor.fm/s/a36f24c3/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </content:encoded>
      <pubDate>Thu, 02 Apr 2026 18:32:24 -0400</pubDate>
      <author>Antisyphon Training</author>
      <enclosure url="https://media.transistor.fm/a36f24c3/6dc41c9e.mp3" length="61058119" type="audio/mpeg"/>
      <itunes:author>Antisyphon Training</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/BPhVYUV753UpIpJQDdRhXH_jZOj9oA4maNfz3XLYcS4/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83Mzhk/N2FhMjk4ODE2NGY1/NGM3YzJiMmFlMWQx/MThmMC5wbmc.jpg"/>
      <itunes:duration>3690</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>What does the ideal SOC ticket look like?</p><p>🛝 Webcast Slides -  <br><a href="https://www.antisyphontraining.com/wp-content/uploads/2026/03/How-to-Write-SOC-Tickets-That-Build-Trust-and-Drive-Action.pdf">https://www.antisyphontraining.com/wp-content/uploads/2026/03/How-to-Write-SOC-Tickets-That-Build-Trust-and-Drive-Action.pdf </a></p><p>Technical skills matter, but clear communication is just as important.</p><p>Join SOC Analyst Dan Rearden for a free one-hour Antisyphon Anti-cast on using soft skills to level up your tickets.</p><p>Learn how to make alerts clear, findings impactful, and documentation useful now and later.</p><p><strong>Chapters</strong><br></p><ul><li>(00:00) - Intro- How to Write SOC Tickets That Build Trust and Drive Action - Dan Rearden</li>
<li>(01:53) - About Dan Rearden</li>
<li>(03:27) - On Call at 2AM...</li>
<li>(05:16) - Beyond the Terminal</li>
<li>(06:22) - Talking to Humans</li>
<li>(09:11) - Reboot Your Vocabulary</li>
<li>(14:44) - Plain Text Protocol</li>
<li>(19:54) - Peer To Peer</li>
<li>(24:44) - The Client Session</li>
<li>(26:06) - The Client Session</li>
<li>(28:13) - Hotfix today</li>
<li>(31:53) - Final System Check</li>
<li>(34:32) - Q&amp;A</li>
</ul><br><strong>Credits</strong><br><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://anticasts.transistor.fm/people/meagan-bentley">Meagan Bentley</a> - Producer</li>
  <li><a href="https://anticasts.transistor.fm/people/cj-cox">CJ Cox</a> - Guest</li>
  <li><a href="https://anticasts.transistor.fm/people/ryan-poirier">Ryan Poirier</a> - Producer</li>
  <li><a href="https://anticasts.transistor.fm/people/dan-rearden-haircutfish">Dan Rearden (Haircutfish)</a> - Guest</li>
</ul><br><strong>Chat with your fellow attendees in the BHIS Discord server:</strong><br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>in the #🔴live-chat channel<p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </strong><br><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p><strong><a href="https://www.youtube.com/watch?v=12ldaGyh7f0" title="Click here to watch a video of this episode.">Click here to watch a video of this episode.</a><br>
</strong></p><p>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p><p><a href="https://share.transistor.fm/s/a36f24c3/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Producer" href="https://anticasts.transistor.fm/people/meagan-bentley">Meagan Bentley</podcast:person>
      <podcast:person role="Guest" href="https://www.blackhillsinfosec.com/team/cj-cox/" img="https://img.transistorcdn.com/EN_ZKJTXbR0W0PY85rrx9qUuNT173PZSO2_kHIMk450/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iOWU1/NWI4NmNjODQ5NTRh/ZjY5MzBmY2E2ZWY0/MmMzMC5qcGc.jpg">CJ Cox</podcast:person>
      <podcast:person role="Producer" href="https://anticasts.transistor.fm/people/ryan-poirier">Ryan Poirier</podcast:person>
      <podcast:person role="Guest" href="https://www.antisyphontraining.com/instructor/danrearden/" img="https://img.transistorcdn.com/dERAgKTDv5vCCHjurTqslhLMKX3q7Jsrfxnm3cbrtX8/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kZDcz/YTI4YTQyMWE5NjA0/Y2I3NDQxYTk2NWQ3/YWUxYi5qcGVn.jpg">Dan Rearden (Haircutfish)</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/a36f24c3/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/a36f24c3/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/a36f24c3/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/a36f24c3/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/a36f24c3/transcription" type="text/html"/>
      <podcast:chapters url="https://share.transistor.fm/s/a36f24c3/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Securing the Cloud in the Age of AI with Andrew Krug</title>
      <itunes:episode>10</itunes:episode>
      <podcast:episode>10</podcast:episode>
      <itunes:title>Securing the Cloud in the Age of AI with Andrew Krug</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">6991e912-1ffb-4dbb-958b-aa531478c286</guid>
      <link>https://share.transistor.fm/s/684c00ac</link>
      <description>
        <![CDATA[<p>Existential Courage: The Hitchhiker's Guide to Surviving AI in Cloud</p><p>🛝 Webcast Slides - <br><a href="https://www.blackhillsinfosec.com/wp-content/uploads/2026/03/SLIDES_The-Hitchhikers-Guide-to-Surviving-AI-in-Cloud.pdf">https://www.blackhillsinfosec.com/wp-content/uploads/2026/03/SLIDES_The-Hitchhikers-Guide-to-Surviving-AI-in-Cloud.pdf</a></p><p>Can AI really help secure the cloud, or is it quietly making things worse?</p><p>Join Antisyphon instructor and security researcher Andrew Krug for a free one-hour Anti-cast on what really happens when AI collides with cloud security.</p><ul><li>Andrew will cut through the hype and look at how LLMs affect IAM, monitoring, governance, and real-world risk.</li><li>Learn where AI helps, where it hallucinates, and how to defend cloud environments without panic.</li><li>Expect practical insights, grounded strategy, and a bit of cosmic humor. Bring your towel. Don’t panic.</li></ul><p><br><strong>Chapters</strong><br></p><ul><li>(00:00) - Intro</li>
<li>(02:44) - Our trip through the galaxy</li>
<li>(03:38) - What kind of literature is the Hitchikerʼs Guide to the Galaxy?</li>
<li>(04:29) - Don't Panic</li>
<li>(05:18) - The Agentic Revolution</li>
<li>(05:56) - Cast of Characters</li>
<li>(07:44) - The State of AI in the Enterprise - Deloitte</li>
<li>(10:53) - How do teams build agents?</li>
<li>(12:11) - What are teams using agents for?</li>
<li>(13:17) - Why build on Bedrock + AWS</li>
<li>(14:17) - Are we learning? Or not learning?</li>
<li>(15:58) - Are you the fixed point in a shifting universe?</li>
<li>(17:01) - TL;DR the majority of these are the same threats we have been dealing with</li>
<li>(18:16) - Prompt Injection is the new SQL Injection</li>
<li>(19:13) - Sandbox Escape</li>
<li>(20:20) - Shared Structure: General Software &amp; AI Supply Chains</li>
<li>(23:03) - The Bad News</li>
<li>(24:29) - Threate Vector Coverage</li>
<li>(25:24) - The Expanding Universe of Secrets</li>
<li>(28:15) - Hope is not a strategy! But a strategy can give us hope.</li>
<li>(28:36) - (Yes we AI-Removed Andrew's Coughs)</li>
<li>(29:40) - back to: Hope is not a strategy! But a strategy can give us hope.</li>
<li>(30:47) - Plan for maximum risk scenarios</li>
<li>(33:03) - Squishy Stuff</li>
<li>(34:38) - KIRO</li>
<li>(37:11) - Infrastructure and Data Protection</li>
<li>(39:11) - Priveledge Escalation Paths – https://pathfinding.cloud</li>
<li>(40:58) - The AI Stuff</li>
<li>(42:01) - So anyway, here's Firewall</li>
<li>(43:34) - OpenTelementry</li>
<li>(46:47) - You still have to have logs</li>
<li>(48:22) - MCP</li>
<li>(49:22) - Learn more from Andrew in: Securing the Cloud Foundations</li>
<li>(50:23) - Post Show Q&amp;A</li>
</ul><br><strong>Credits</strong><br><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://anticasts.transistor.fm/people/andrew-krug">Andrew Krug</a> - Guest</li>
  <li><a href="https://anticasts.transistor.fm/people/jason-blanchard">Jason Blanchard</a> - Host</li>
  <li><a href="https://anticasts.transistor.fm/people/deb-wigley">Deb Wigley</a> - Host</li>
</ul><br><strong>Chat with your fellow attendees in the BHIS Discord server:</strong><br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>in the #🔴live-chat channel<p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </strong><br><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p><strong><a href="https://www.youtube.com/watch?v=vIc_21xUpys" title="Click here to watch a video of this episode.">Click here to watch a video of this episode.</a><br>
</strong></p><p>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p><p><a href="https://share.transistor.fm/s/684c00ac/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Existential Courage: The Hitchhiker's Guide to Surviving AI in Cloud</p><p>🛝 Webcast Slides - <br><a href="https://www.blackhillsinfosec.com/wp-content/uploads/2026/03/SLIDES_The-Hitchhikers-Guide-to-Surviving-AI-in-Cloud.pdf">https://www.blackhillsinfosec.com/wp-content/uploads/2026/03/SLIDES_The-Hitchhikers-Guide-to-Surviving-AI-in-Cloud.pdf</a></p><p>Can AI really help secure the cloud, or is it quietly making things worse?</p><p>Join Antisyphon instructor and security researcher Andrew Krug for a free one-hour Anti-cast on what really happens when AI collides with cloud security.</p><ul><li>Andrew will cut through the hype and look at how LLMs affect IAM, monitoring, governance, and real-world risk.</li><li>Learn where AI helps, where it hallucinates, and how to defend cloud environments without panic.</li><li>Expect practical insights, grounded strategy, and a bit of cosmic humor. Bring your towel. Don’t panic.</li></ul><p><br><strong>Chapters</strong><br></p><ul><li>(00:00) - Intro</li>
<li>(02:44) - Our trip through the galaxy</li>
<li>(03:38) - What kind of literature is the Hitchikerʼs Guide to the Galaxy?</li>
<li>(04:29) - Don't Panic</li>
<li>(05:18) - The Agentic Revolution</li>
<li>(05:56) - Cast of Characters</li>
<li>(07:44) - The State of AI in the Enterprise - Deloitte</li>
<li>(10:53) - How do teams build agents?</li>
<li>(12:11) - What are teams using agents for?</li>
<li>(13:17) - Why build on Bedrock + AWS</li>
<li>(14:17) - Are we learning? Or not learning?</li>
<li>(15:58) - Are you the fixed point in a shifting universe?</li>
<li>(17:01) - TL;DR the majority of these are the same threats we have been dealing with</li>
<li>(18:16) - Prompt Injection is the new SQL Injection</li>
<li>(19:13) - Sandbox Escape</li>
<li>(20:20) - Shared Structure: General Software &amp; AI Supply Chains</li>
<li>(23:03) - The Bad News</li>
<li>(24:29) - Threate Vector Coverage</li>
<li>(25:24) - The Expanding Universe of Secrets</li>
<li>(28:15) - Hope is not a strategy! But a strategy can give us hope.</li>
<li>(28:36) - (Yes we AI-Removed Andrew's Coughs)</li>
<li>(29:40) - back to: Hope is not a strategy! But a strategy can give us hope.</li>
<li>(30:47) - Plan for maximum risk scenarios</li>
<li>(33:03) - Squishy Stuff</li>
<li>(34:38) - KIRO</li>
<li>(37:11) - Infrastructure and Data Protection</li>
<li>(39:11) - Priveledge Escalation Paths – https://pathfinding.cloud</li>
<li>(40:58) - The AI Stuff</li>
<li>(42:01) - So anyway, here's Firewall</li>
<li>(43:34) - OpenTelementry</li>
<li>(46:47) - You still have to have logs</li>
<li>(48:22) - MCP</li>
<li>(49:22) - Learn more from Andrew in: Securing the Cloud Foundations</li>
<li>(50:23) - Post Show Q&amp;A</li>
</ul><br><strong>Credits</strong><br><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://anticasts.transistor.fm/people/andrew-krug">Andrew Krug</a> - Guest</li>
  <li><a href="https://anticasts.transistor.fm/people/jason-blanchard">Jason Blanchard</a> - Host</li>
  <li><a href="https://anticasts.transistor.fm/people/deb-wigley">Deb Wigley</a> - Host</li>
</ul><br><strong>Chat with your fellow attendees in the BHIS Discord server:</strong><br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>in the #🔴live-chat channel<p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </strong><br><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p><strong><a href="https://www.youtube.com/watch?v=vIc_21xUpys" title="Click here to watch a video of this episode.">Click here to watch a video of this episode.</a><br>
</strong></p><p>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p><p><a href="https://share.transistor.fm/s/684c00ac/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </content:encoded>
      <pubDate>Fri, 27 Mar 2026 18:39:08 -0400</pubDate>
      <author>Antisyphon Training</author>
      <enclosure url="https://media.transistor.fm/684c00ac/af1db5b1.mp3" length="60994009" type="audio/mpeg"/>
      <itunes:author>Antisyphon Training</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/1Ctnoc2a3LN8Hc_AoyFJRFqHFQRwX3DLkf8Cp1vID5o/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85NGRj/ZTVmOTBhNzMyOTBj/MjEwMTk0NTgxMmQ4/ZDAzNi5wbmc.jpg"/>
      <itunes:duration>3540</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Existential Courage: The Hitchhiker's Guide to Surviving AI in Cloud</p><p>🛝 Webcast Slides - <br><a href="https://www.blackhillsinfosec.com/wp-content/uploads/2026/03/SLIDES_The-Hitchhikers-Guide-to-Surviving-AI-in-Cloud.pdf">https://www.blackhillsinfosec.com/wp-content/uploads/2026/03/SLIDES_The-Hitchhikers-Guide-to-Surviving-AI-in-Cloud.pdf</a></p><p>Can AI really help secure the cloud, or is it quietly making things worse?</p><p>Join Antisyphon instructor and security researcher Andrew Krug for a free one-hour Anti-cast on what really happens when AI collides with cloud security.</p><ul><li>Andrew will cut through the hype and look at how LLMs affect IAM, monitoring, governance, and real-world risk.</li><li>Learn where AI helps, where it hallucinates, and how to defend cloud environments without panic.</li><li>Expect practical insights, grounded strategy, and a bit of cosmic humor. Bring your towel. Don’t panic.</li></ul><p><br><strong>Chapters</strong><br></p><ul><li>(00:00) - Intro</li>
<li>(02:44) - Our trip through the galaxy</li>
<li>(03:38) - What kind of literature is the Hitchikerʼs Guide to the Galaxy?</li>
<li>(04:29) - Don't Panic</li>
<li>(05:18) - The Agentic Revolution</li>
<li>(05:56) - Cast of Characters</li>
<li>(07:44) - The State of AI in the Enterprise - Deloitte</li>
<li>(10:53) - How do teams build agents?</li>
<li>(12:11) - What are teams using agents for?</li>
<li>(13:17) - Why build on Bedrock + AWS</li>
<li>(14:17) - Are we learning? Or not learning?</li>
<li>(15:58) - Are you the fixed point in a shifting universe?</li>
<li>(17:01) - TL;DR the majority of these are the same threats we have been dealing with</li>
<li>(18:16) - Prompt Injection is the new SQL Injection</li>
<li>(19:13) - Sandbox Escape</li>
<li>(20:20) - Shared Structure: General Software &amp; AI Supply Chains</li>
<li>(23:03) - The Bad News</li>
<li>(24:29) - Threate Vector Coverage</li>
<li>(25:24) - The Expanding Universe of Secrets</li>
<li>(28:15) - Hope is not a strategy! But a strategy can give us hope.</li>
<li>(28:36) - (Yes we AI-Removed Andrew's Coughs)</li>
<li>(29:40) - back to: Hope is not a strategy! But a strategy can give us hope.</li>
<li>(30:47) - Plan for maximum risk scenarios</li>
<li>(33:03) - Squishy Stuff</li>
<li>(34:38) - KIRO</li>
<li>(37:11) - Infrastructure and Data Protection</li>
<li>(39:11) - Priveledge Escalation Paths – https://pathfinding.cloud</li>
<li>(40:58) - The AI Stuff</li>
<li>(42:01) - So anyway, here's Firewall</li>
<li>(43:34) - OpenTelementry</li>
<li>(46:47) - You still have to have logs</li>
<li>(48:22) - MCP</li>
<li>(49:22) - Learn more from Andrew in: Securing the Cloud Foundations</li>
<li>(50:23) - Post Show Q&amp;A</li>
</ul><br><strong>Credits</strong><br><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://anticasts.transistor.fm/people/andrew-krug">Andrew Krug</a> - Guest</li>
  <li><a href="https://anticasts.transistor.fm/people/jason-blanchard">Jason Blanchard</a> - Host</li>
  <li><a href="https://anticasts.transistor.fm/people/deb-wigley">Deb Wigley</a> - Host</li>
</ul><br><strong>Chat with your fellow attendees in the BHIS Discord server:</strong><br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>in the #🔴live-chat channel<p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </strong><br><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p><strong><a href="https://www.youtube.com/watch?v=vIc_21xUpys" title="Click here to watch a video of this episode.">Click here to watch a video of this episode.</a><br>
</strong></p><p>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p><p><a href="https://share.transistor.fm/s/684c00ac/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Guest" href="https://www.andrewkrug.com" img="https://img.transistorcdn.com/DJeXvZJLHGU_puo8fMaEmRdlURyVYz8Sdovqc5a_8vM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80Y2Yw/NDFmZjRiZGQ0OWFk/NWQyODQwZTYxZTVl/MzU3My5qcGc.jpg">Andrew Krug</podcast:person>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/jason-blanchard/" img="https://img.transistorcdn.com/oVODZzuZpe4Vq2roY7S8ylFKDJ-z1ox7zXIQBkK72YI/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hNmM0/MzMxZmRkZDVjNjRh/ODgwNjczNzkyMDk0/MDYxNi5qcGc.jpg">Jason Blanchard</podcast:person>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/deb-wigley/" img="https://img.transistorcdn.com/Nt6fFMvfAHIDZCPqAW-MC0l2-ZfPSwijcGDvtt7N3Bg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lZWJk/MGI0NTk1Y2YyNjM4/NzhiZmZhODRmOGJj/OTFhNy5qcGc.jpg">Deb Wigley</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/684c00ac/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/684c00ac/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/684c00ac/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/684c00ac/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/684c00ac/transcription" type="text/html"/>
      <podcast:chapters url="https://share.transistor.fm/s/684c00ac/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>How to Detect Malicious Remote Workers w/ James McQuiggan</title>
      <itunes:episode>9</itunes:episode>
      <podcast:episode>9</podcast:episode>
      <itunes:title>How to Detect Malicious Remote Workers w/ James McQuiggan</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f27d14cd-d335-4a22-88f9-9a27bbf6a5f7</guid>
      <link>https://share.transistor.fm/s/aff37195</link>
      <description>
        <![CDATA[<p><strong>Summary</strong><br>Could a nation-state threat actor get hired and stay invisible to your SOC?</p><p><strong>🛝Webcast Slides-</strong><br><a href="https://www.blackhillsinfosec.com/wp-content/uploads/2026/03/SLIDES_2026-03-11-AntiSyphon-DPRK-Hiring.pdf">https://www.blackhillsinfosec.com/wp-content/uploads/2026/03/SLIDES_2026-03-11-AntiSyphon-DPRK-Hiring.pdf</a></p><p>Join us for a free one-hour training session with James McQuiggan, CISSP and Advisory CISO, as he teaches you the full lifecycle of North Korea’s AI-enabled IT worker operation, from AI-generated identities and U.S.-based laptop farms to the data theft and extortion that follow once they’re inside.</p><p>You’ll learn a practical detection and hunting playbook covering behavioral anomalies, identity red flags, and post-hire SOC indicators that catch what background checks miss.</p><p>If your SOC isn’t hunting for threats that were hired legitimately, this Antisyphon Anti-cast will change that.</p><p><br><strong>Chapters</strong><br></p><ul><li>(00:00) - Intro – How to Detect Malicious Remote Workers - James McQuiggan</li>
<li>(01:17) - DPRK Solution – Did you Hire a North Korean?</li>
<li>(02:35) - But Really, Did We Just Hire a North Korean?</li>
<li>(04:31) - How comfortable are you to spot deepfakes?</li>
<li>(05:46) - Who is James R. McQuiggan</li>
<li>(07:42) - Webcast Agenda</li>
<li>(09:36) - Overview - North Korea Situation</li>
<li>(11:56) - DRPK Education</li>
<li>(14:31) - The Ultimate Inside Threat – DPRK Job Opps</li>
<li>(16:17) - Attacker's Playbook — Contagious Interview / WageMole Campaigns</li>
<li>(17:47) - Investigations – Crowdstrike / Okta / Unit 42</li>
<li>(19:14) - How Identities Are Built – AI Images</li>
<li>(21:05) - GenAI Resumes</li>
<li>(23:39) - Stateside Assistance</li>
<li>(25:23) - Face Swap / Voice Cloning &amp; Webcams ➜ LIVE Deepfakes</li>
<li>(25:49) - AI Face Swap Demo</li>
<li>(29:55) - Video Camera Real time Video Deepfake Face Swap Interview</li>
<li>(30:43) - KnowBe4 Use Case – July 2024</li>
<li>(34:18) - Legal Impact</li>
<li>(35:42) - Companies Infiltrated — The Numbers</li>
<li>(36:11) - North Korean Farmers Arrested</li>
<li>(40:23) - SOC Playbook – Deepfake Dashboard</li>
<li>(40:53) - 12 Best AI Deepfake Detector Tools</li>
<li>(41:54) - Detecting VOIP Numbers &amp; Identity</li>
<li>(43:01) - SOC Telemetry</li>
<li>(45:17) - Hiring Flags</li>
<li>(46:08) - HR – Hiring Tips</li>
<li>(48:24) - Human Risk – AI First Ready Security Team</li>
<li>(50:26) - Wrap Up and Q&amp;A</li>
<li>(54:39) - James' Survey QR Code</li>
</ul><br><strong>Credits</strong><br><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://anticasts.transistor.fm/people/deb-wigley">Deb Wigley</a> - Host</li>
  <li><a href="https://anticasts.transistor.fm/people/jason-blanchard">Jason Blanchard</a> - Host</li>
  <li><a href="https://anticasts.transistor.fm/people/james-mcquiggan">James McQuiggan</a> - Guest</li>
</ul><br><strong>Chat with your fellow attendees in the BHIS Discord server:</strong><br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>in the #🔴live-chat channel<p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </strong><br><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p><strong><a href="https://www.youtube.com/watch?v=yDewa1GuDPs" title="Click here to watch a video of this episode.">Click here to watch a video of this episode.</a><br>
</strong></p><p>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p><p><a href="https://share.transistor.fm/s/aff37195/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Summary</strong><br>Could a nation-state threat actor get hired and stay invisible to your SOC?</p><p><strong>🛝Webcast Slides-</strong><br><a href="https://www.blackhillsinfosec.com/wp-content/uploads/2026/03/SLIDES_2026-03-11-AntiSyphon-DPRK-Hiring.pdf">https://www.blackhillsinfosec.com/wp-content/uploads/2026/03/SLIDES_2026-03-11-AntiSyphon-DPRK-Hiring.pdf</a></p><p>Join us for a free one-hour training session with James McQuiggan, CISSP and Advisory CISO, as he teaches you the full lifecycle of North Korea’s AI-enabled IT worker operation, from AI-generated identities and U.S.-based laptop farms to the data theft and extortion that follow once they’re inside.</p><p>You’ll learn a practical detection and hunting playbook covering behavioral anomalies, identity red flags, and post-hire SOC indicators that catch what background checks miss.</p><p>If your SOC isn’t hunting for threats that were hired legitimately, this Antisyphon Anti-cast will change that.</p><p><br><strong>Chapters</strong><br></p><ul><li>(00:00) - Intro – How to Detect Malicious Remote Workers - James McQuiggan</li>
<li>(01:17) - DPRK Solution – Did you Hire a North Korean?</li>
<li>(02:35) - But Really, Did We Just Hire a North Korean?</li>
<li>(04:31) - How comfortable are you to spot deepfakes?</li>
<li>(05:46) - Who is James R. McQuiggan</li>
<li>(07:42) - Webcast Agenda</li>
<li>(09:36) - Overview - North Korea Situation</li>
<li>(11:56) - DRPK Education</li>
<li>(14:31) - The Ultimate Inside Threat – DPRK Job Opps</li>
<li>(16:17) - Attacker's Playbook — Contagious Interview / WageMole Campaigns</li>
<li>(17:47) - Investigations – Crowdstrike / Okta / Unit 42</li>
<li>(19:14) - How Identities Are Built – AI Images</li>
<li>(21:05) - GenAI Resumes</li>
<li>(23:39) - Stateside Assistance</li>
<li>(25:23) - Face Swap / Voice Cloning &amp; Webcams ➜ LIVE Deepfakes</li>
<li>(25:49) - AI Face Swap Demo</li>
<li>(29:55) - Video Camera Real time Video Deepfake Face Swap Interview</li>
<li>(30:43) - KnowBe4 Use Case – July 2024</li>
<li>(34:18) - Legal Impact</li>
<li>(35:42) - Companies Infiltrated — The Numbers</li>
<li>(36:11) - North Korean Farmers Arrested</li>
<li>(40:23) - SOC Playbook – Deepfake Dashboard</li>
<li>(40:53) - 12 Best AI Deepfake Detector Tools</li>
<li>(41:54) - Detecting VOIP Numbers &amp; Identity</li>
<li>(43:01) - SOC Telemetry</li>
<li>(45:17) - Hiring Flags</li>
<li>(46:08) - HR – Hiring Tips</li>
<li>(48:24) - Human Risk – AI First Ready Security Team</li>
<li>(50:26) - Wrap Up and Q&amp;A</li>
<li>(54:39) - James' Survey QR Code</li>
</ul><br><strong>Credits</strong><br><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://anticasts.transistor.fm/people/deb-wigley">Deb Wigley</a> - Host</li>
  <li><a href="https://anticasts.transistor.fm/people/jason-blanchard">Jason Blanchard</a> - Host</li>
  <li><a href="https://anticasts.transistor.fm/people/james-mcquiggan">James McQuiggan</a> - Guest</li>
</ul><br><strong>Chat with your fellow attendees in the BHIS Discord server:</strong><br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>in the #🔴live-chat channel<p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </strong><br><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p><strong><a href="https://www.youtube.com/watch?v=yDewa1GuDPs" title="Click here to watch a video of this episode.">Click here to watch a video of this episode.</a><br>
</strong></p><p>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p><p><a href="https://share.transistor.fm/s/aff37195/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </content:encoded>
      <pubDate>Tue, 17 Mar 2026 17:21:39 -0400</pubDate>
      <author>Antisyphon Training</author>
      <enclosure url="https://media.transistor.fm/aff37195/1381cd08.mp3" length="61444348" type="audio/mpeg"/>
      <itunes:author>Antisyphon Training</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/kuaCsmrlr5T3_SsNeiORUqpehjZLSGL-eSNFjYde4UQ/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85NTk2/MzNhMWI4YmVmMjg2/ODczNjY4YWVmMTE5/YzA5ZC5wbmc.jpg"/>
      <itunes:duration>3587</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>Summary</strong><br>Could a nation-state threat actor get hired and stay invisible to your SOC?</p><p><strong>🛝Webcast Slides-</strong><br><a href="https://www.blackhillsinfosec.com/wp-content/uploads/2026/03/SLIDES_2026-03-11-AntiSyphon-DPRK-Hiring.pdf">https://www.blackhillsinfosec.com/wp-content/uploads/2026/03/SLIDES_2026-03-11-AntiSyphon-DPRK-Hiring.pdf</a></p><p>Join us for a free one-hour training session with James McQuiggan, CISSP and Advisory CISO, as he teaches you the full lifecycle of North Korea’s AI-enabled IT worker operation, from AI-generated identities and U.S.-based laptop farms to the data theft and extortion that follow once they’re inside.</p><p>You’ll learn a practical detection and hunting playbook covering behavioral anomalies, identity red flags, and post-hire SOC indicators that catch what background checks miss.</p><p>If your SOC isn’t hunting for threats that were hired legitimately, this Antisyphon Anti-cast will change that.</p><p><br><strong>Chapters</strong><br></p><ul><li>(00:00) - Intro – How to Detect Malicious Remote Workers - James McQuiggan</li>
<li>(01:17) - DPRK Solution – Did you Hire a North Korean?</li>
<li>(02:35) - But Really, Did We Just Hire a North Korean?</li>
<li>(04:31) - How comfortable are you to spot deepfakes?</li>
<li>(05:46) - Who is James R. McQuiggan</li>
<li>(07:42) - Webcast Agenda</li>
<li>(09:36) - Overview - North Korea Situation</li>
<li>(11:56) - DRPK Education</li>
<li>(14:31) - The Ultimate Inside Threat – DPRK Job Opps</li>
<li>(16:17) - Attacker's Playbook — Contagious Interview / WageMole Campaigns</li>
<li>(17:47) - Investigations – Crowdstrike / Okta / Unit 42</li>
<li>(19:14) - How Identities Are Built – AI Images</li>
<li>(21:05) - GenAI Resumes</li>
<li>(23:39) - Stateside Assistance</li>
<li>(25:23) - Face Swap / Voice Cloning &amp; Webcams ➜ LIVE Deepfakes</li>
<li>(25:49) - AI Face Swap Demo</li>
<li>(29:55) - Video Camera Real time Video Deepfake Face Swap Interview</li>
<li>(30:43) - KnowBe4 Use Case – July 2024</li>
<li>(34:18) - Legal Impact</li>
<li>(35:42) - Companies Infiltrated — The Numbers</li>
<li>(36:11) - North Korean Farmers Arrested</li>
<li>(40:23) - SOC Playbook – Deepfake Dashboard</li>
<li>(40:53) - 12 Best AI Deepfake Detector Tools</li>
<li>(41:54) - Detecting VOIP Numbers &amp; Identity</li>
<li>(43:01) - SOC Telemetry</li>
<li>(45:17) - Hiring Flags</li>
<li>(46:08) - HR – Hiring Tips</li>
<li>(48:24) - Human Risk – AI First Ready Security Team</li>
<li>(50:26) - Wrap Up and Q&amp;A</li>
<li>(54:39) - James' Survey QR Code</li>
</ul><br><strong>Credits</strong><br><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://anticasts.transistor.fm/people/deb-wigley">Deb Wigley</a> - Host</li>
  <li><a href="https://anticasts.transistor.fm/people/jason-blanchard">Jason Blanchard</a> - Host</li>
  <li><a href="https://anticasts.transistor.fm/people/james-mcquiggan">James McQuiggan</a> - Guest</li>
</ul><br><strong>Chat with your fellow attendees in the BHIS Discord server:</strong><br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>in the #🔴live-chat channel<p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </strong><br><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p><strong><a href="https://www.youtube.com/watch?v=yDewa1GuDPs" title="Click here to watch a video of this episode.">Click here to watch a video of this episode.</a><br>
</strong></p><p>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p><p><a href="https://share.transistor.fm/s/aff37195/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/deb-wigley/" img="https://img.transistorcdn.com/Nt6fFMvfAHIDZCPqAW-MC0l2-ZfPSwijcGDvtt7N3Bg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lZWJk/MGI0NTk1Y2YyNjM4/NzhiZmZhODRmOGJj/OTFhNy5qcGc.jpg">Deb Wigley</podcast:person>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/jason-blanchard/" img="https://img.transistorcdn.com/oVODZzuZpe4Vq2roY7S8ylFKDJ-z1ox7zXIQBkK72YI/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hNmM0/MzMxZmRkZDVjNjRh/ODgwNjczNzkyMDk0/MDYxNi5qcGc.jpg">Jason Blanchard</podcast:person>
      <podcast:person role="Guest" href="https://jamesmcquiggan.com" img="https://img.transistorcdn.com/4gJmaW91LohK3QqWq8LEaKgkSrbHCGB2dkZ-QVQ4rL0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iNTFk/NGVhZTZiODU2YjM5/YmIyMGJkYzVjZWFm/MTFlYi5qcGc.jpg">James McQuiggan</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/aff37195/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/aff37195/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/aff37195/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/aff37195/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/aff37195/transcription" type="text/html"/>
      <podcast:chapters url="https://share.transistor.fm/s/aff37195/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Preparing IR for AI Incidents with Gerard Johansen</title>
      <itunes:episode>8</itunes:episode>
      <podcast:episode>8</podcast:episode>
      <itunes:title>Preparing IR for AI Incidents with Gerard Johansen</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">88703f7b-13db-4f02-a865-97aae3557502</guid>
      <link>https://share.transistor.fm/s/60288fee</link>
      <description>
        <![CDATA[<p>Is your Incident Response plan AI ready?</p><p>Join us for a free one-hour training session with incident management expert and instructor Gerard Johansen, where he'll teach how to adapt your Incident Response plan to AI-related risks and threats.</p><p>You’ll learn how AI incidents actually happen and how to respond to them.</p><p>Gerard will also cover what to include in your incident response plan so you’re prepared as your organization adopts AI.</p><p><strong>🛝 Webcast Slides</strong><br><a href="https://www.blackhillsinfosec.com/wp-content/uploads/2026/03/SLIDES_Antisyphon-Anti-Cast-IR-in-AI.pdf">https://www.blackhillsinfosec.com/wp-content/uploads/2026/03/SLIDES_Antisyphon-Anti-Cast-IR-in-AI.pdf</a></p><p><strong>Chapters</strong><br></p><ul><li>(00:00) - Intro</li>
<li>(02:33) - Who is Gerard Johansen</li>
<li>(03:10) - Webcast Agenda</li>
<li>(04:58) - Our Guardrails</li>
<li>(07:36) - Challenges in AI Incident Response</li>
<li>(09:48) - Artificial Intelligence Hype</li>
<li>(10:46) - Our Assets Column</li>
<li>(11:59) - History doesn’t repeat, it rhymes.</li>
<li>(15:09) - Classification Model</li>
<li>(17:08) - Threat Actor Use</li>
<li>(18:40) - Threat Actor - Case Studies</li>
<li>(20:01) - Key Points to Consider</li>
<li>(21:40) - GenAI Targeting</li>
<li>(22:21) - GenAI Targeting - Case Studies</li>
<li>(23:02) - [more] Key Points to Consider</li>
<li>(24:33) - Internally Generated AI Incident</li>
<li>(26:02) - Internally Generated - Case Studies</li>
<li>(27:00) - [even more] Key Points to Consider</li>
<li>(29:09) - AI Readiness Planning - Key Assumptions</li>
<li>(30:06) - AI Readiness Planning</li>
<li>(30:46) - Establish a clear and concise definition</li>
<li>(32:19) - Establish Incident Criteria</li>
<li>(34:24) - Rework Existing Processes</li>
<li>(36:26) - Tie in Additional Stakeholders</li>
<li>(37:44) - Information Sharing</li>
<li>(41:13) - AI Incident Premortem</li>
<li>(44:13) - Continuously Review</li>
<li>(46:13) - Hypothesize, Test &amp; Improve</li>
<li>(48:23) - Key Points for the plan</li>
<li>(50:47) - Sumamry</li>
<li>(52:03) - Questions &amp; Discussion</li>
</ul><br><strong><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://anticasts.transistor.fm/people/gerard-johansen">Gerard Johansen</a> - Guest</li>
  <li><a href="https://anticasts.transistor.fm/people/deb-wigley">Deb Wigley</a> - Host</li>
  <li><a href="https://anticasts.transistor.fm/people/jason-blanchard">Jason Blanchard</a> - Host</li>
  <li><a href="https://anticasts.transistor.fm/people/meagan-bentley">Meagan Bentley</a> - Producer</li>
</ul></strong><p><strong>Chat with your fellow attendees in the BHIS Discord server:</strong><br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>in the #🔴live-chat channel</p><p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </strong><br><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p><strong><a href="https://www.youtube.com/watch?v=lfQJZdFNYnQ" title="Click here to watch a video of this episode.">Click here to watch a video of this episode.</a><br>
</strong></p><p>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p><p><strong><a href="https://share.transistor.fm/s/60288fee/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</strong></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Is your Incident Response plan AI ready?</p><p>Join us for a free one-hour training session with incident management expert and instructor Gerard Johansen, where he'll teach how to adapt your Incident Response plan to AI-related risks and threats.</p><p>You’ll learn how AI incidents actually happen and how to respond to them.</p><p>Gerard will also cover what to include in your incident response plan so you’re prepared as your organization adopts AI.</p><p><strong>🛝 Webcast Slides</strong><br><a href="https://www.blackhillsinfosec.com/wp-content/uploads/2026/03/SLIDES_Antisyphon-Anti-Cast-IR-in-AI.pdf">https://www.blackhillsinfosec.com/wp-content/uploads/2026/03/SLIDES_Antisyphon-Anti-Cast-IR-in-AI.pdf</a></p><p><strong>Chapters</strong><br></p><ul><li>(00:00) - Intro</li>
<li>(02:33) - Who is Gerard Johansen</li>
<li>(03:10) - Webcast Agenda</li>
<li>(04:58) - Our Guardrails</li>
<li>(07:36) - Challenges in AI Incident Response</li>
<li>(09:48) - Artificial Intelligence Hype</li>
<li>(10:46) - Our Assets Column</li>
<li>(11:59) - History doesn’t repeat, it rhymes.</li>
<li>(15:09) - Classification Model</li>
<li>(17:08) - Threat Actor Use</li>
<li>(18:40) - Threat Actor - Case Studies</li>
<li>(20:01) - Key Points to Consider</li>
<li>(21:40) - GenAI Targeting</li>
<li>(22:21) - GenAI Targeting - Case Studies</li>
<li>(23:02) - [more] Key Points to Consider</li>
<li>(24:33) - Internally Generated AI Incident</li>
<li>(26:02) - Internally Generated - Case Studies</li>
<li>(27:00) - [even more] Key Points to Consider</li>
<li>(29:09) - AI Readiness Planning - Key Assumptions</li>
<li>(30:06) - AI Readiness Planning</li>
<li>(30:46) - Establish a clear and concise definition</li>
<li>(32:19) - Establish Incident Criteria</li>
<li>(34:24) - Rework Existing Processes</li>
<li>(36:26) - Tie in Additional Stakeholders</li>
<li>(37:44) - Information Sharing</li>
<li>(41:13) - AI Incident Premortem</li>
<li>(44:13) - Continuously Review</li>
<li>(46:13) - Hypothesize, Test &amp; Improve</li>
<li>(48:23) - Key Points for the plan</li>
<li>(50:47) - Sumamry</li>
<li>(52:03) - Questions &amp; Discussion</li>
</ul><br><strong><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://anticasts.transistor.fm/people/gerard-johansen">Gerard Johansen</a> - Guest</li>
  <li><a href="https://anticasts.transistor.fm/people/deb-wigley">Deb Wigley</a> - Host</li>
  <li><a href="https://anticasts.transistor.fm/people/jason-blanchard">Jason Blanchard</a> - Host</li>
  <li><a href="https://anticasts.transistor.fm/people/meagan-bentley">Meagan Bentley</a> - Producer</li>
</ul></strong><p><strong>Chat with your fellow attendees in the BHIS Discord server:</strong><br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>in the #🔴live-chat channel</p><p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </strong><br><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p><strong><a href="https://www.youtube.com/watch?v=lfQJZdFNYnQ" title="Click here to watch a video of this episode.">Click here to watch a video of this episode.</a><br>
</strong></p><p>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p><p><strong><a href="https://share.transistor.fm/s/60288fee/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</strong></p>]]>
      </content:encoded>
      <pubDate>Thu, 05 Mar 2026 16:49:46 -0500</pubDate>
      <author>Antisyphon Training</author>
      <enclosure url="https://media.transistor.fm/60288fee/368e52a2.mp3" length="72123984" type="audio/mpeg"/>
      <itunes:author>Antisyphon Training</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/199TyriBIkMs6_OBUga1YEvhnYnuU5fYFQpIB1jIbf4/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9mZTlj/ZDlhNmJkYjBiNTcz/MmM4ZjhiMmZiNDJk/YjU3My5wbmc.jpg"/>
      <itunes:duration>4240</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Is your Incident Response plan AI ready?</p><p>Join us for a free one-hour training session with incident management expert and instructor Gerard Johansen, where he'll teach how to adapt your Incident Response plan to AI-related risks and threats.</p><p>You’ll learn how AI incidents actually happen and how to respond to them.</p><p>Gerard will also cover what to include in your incident response plan so you’re prepared as your organization adopts AI.</p><p><strong>🛝 Webcast Slides</strong><br><a href="https://www.blackhillsinfosec.com/wp-content/uploads/2026/03/SLIDES_Antisyphon-Anti-Cast-IR-in-AI.pdf">https://www.blackhillsinfosec.com/wp-content/uploads/2026/03/SLIDES_Antisyphon-Anti-Cast-IR-in-AI.pdf</a></p><p><strong>Chapters</strong><br></p><ul><li>(00:00) - Intro</li>
<li>(02:33) - Who is Gerard Johansen</li>
<li>(03:10) - Webcast Agenda</li>
<li>(04:58) - Our Guardrails</li>
<li>(07:36) - Challenges in AI Incident Response</li>
<li>(09:48) - Artificial Intelligence Hype</li>
<li>(10:46) - Our Assets Column</li>
<li>(11:59) - History doesn’t repeat, it rhymes.</li>
<li>(15:09) - Classification Model</li>
<li>(17:08) - Threat Actor Use</li>
<li>(18:40) - Threat Actor - Case Studies</li>
<li>(20:01) - Key Points to Consider</li>
<li>(21:40) - GenAI Targeting</li>
<li>(22:21) - GenAI Targeting - Case Studies</li>
<li>(23:02) - [more] Key Points to Consider</li>
<li>(24:33) - Internally Generated AI Incident</li>
<li>(26:02) - Internally Generated - Case Studies</li>
<li>(27:00) - [even more] Key Points to Consider</li>
<li>(29:09) - AI Readiness Planning - Key Assumptions</li>
<li>(30:06) - AI Readiness Planning</li>
<li>(30:46) - Establish a clear and concise definition</li>
<li>(32:19) - Establish Incident Criteria</li>
<li>(34:24) - Rework Existing Processes</li>
<li>(36:26) - Tie in Additional Stakeholders</li>
<li>(37:44) - Information Sharing</li>
<li>(41:13) - AI Incident Premortem</li>
<li>(44:13) - Continuously Review</li>
<li>(46:13) - Hypothesize, Test &amp; Improve</li>
<li>(48:23) - Key Points for the plan</li>
<li>(50:47) - Sumamry</li>
<li>(52:03) - Questions &amp; Discussion</li>
</ul><br><strong><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://anticasts.transistor.fm/people/gerard-johansen">Gerard Johansen</a> - Guest</li>
  <li><a href="https://anticasts.transistor.fm/people/deb-wigley">Deb Wigley</a> - Host</li>
  <li><a href="https://anticasts.transistor.fm/people/jason-blanchard">Jason Blanchard</a> - Host</li>
  <li><a href="https://anticasts.transistor.fm/people/meagan-bentley">Meagan Bentley</a> - Producer</li>
</ul></strong><p><strong>Chat with your fellow attendees in the BHIS Discord server:</strong><br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>in the #🔴live-chat channel</p><p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </strong><br><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p><strong><a href="https://www.youtube.com/watch?v=lfQJZdFNYnQ" title="Click here to watch a video of this episode.">Click here to watch a video of this episode.</a><br>
</strong></p><p>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p><p><strong><a href="https://share.transistor.fm/s/60288fee/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</strong></p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Guest" href="https://www.antisyphontraining.com/instructor/gerard-johansen/" img="https://img.transistorcdn.com/fEbSwH1XgppJtlgY71ujf39mrQ7DKhygf2sCOaNdBWI/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9mOTM2/ODdjZmM5ZjhkNWJl/OTllZWJkMDQwYzNk/NjE0Ny5qcGc.jpg">Gerard Johansen</podcast:person>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/deb-wigley/" img="https://img.transistorcdn.com/Nt6fFMvfAHIDZCPqAW-MC0l2-ZfPSwijcGDvtt7N3Bg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lZWJk/MGI0NTk1Y2YyNjM4/NzhiZmZhODRmOGJj/OTFhNy5qcGc.jpg">Deb Wigley</podcast:person>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/jason-blanchard/" img="https://img.transistorcdn.com/oVODZzuZpe4Vq2roY7S8ylFKDJ-z1ox7zXIQBkK72YI/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hNmM0/MzMxZmRkZDVjNjRh/ODgwNjczNzkyMDk0/MDYxNi5qcGc.jpg">Jason Blanchard</podcast:person>
      <podcast:person role="Producer" href="https://anticasts.transistor.fm/people/meagan-bentley">Meagan Bentley</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/60288fee/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/60288fee/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/60288fee/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/60288fee/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/60288fee/transcription" type="text/html"/>
      <podcast:chapters url="https://share.transistor.fm/s/60288fee/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Red Teaming AI: OWASP LLM Top 10 with Brian and Derek</title>
      <itunes:episode>7</itunes:episode>
      <podcast:episode>7</podcast:episode>
      <itunes:title>Red Teaming AI: OWASP LLM Top 10 with Brian and Derek</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">00eed726-fb20-49f7-a32c-9a6bb0abff5a</guid>
      <link>https://share.transistor.fm/s/09e57328</link>
      <description>
        <![CDATA[<p><strong>Summary</strong><br>Are you currently testing your AI systems the same way you test traditional apps?</p><p>🛝 Webcast Slides<br><a href="https://www.antisyphontraining.com/wp-content/uploads/2026/02/AI-LLM-Red-Teaming.pdf">https://www.antisyphontraining.com/wp-content/uploads/2026/02/AI-LLM-Red-Teaming.pdf</a></p><p>Join AI researchers Brian Fehrman and Derek Banks for a free one-hour training session that breaks down the OWASP Top 10 AI-LLM risks clearly and practically.</p><p>You’ll learn in this Antisyphon Anti-cast how LLM security issues show up in real systems, how attackers test them, and what to focus on to secure AI applications with a practical, security-first mindset.</p><p><br><strong>Chapters</strong><br></p><ul><li>(00:00) - Intro</li>
<li>(01:09) - Webcast Agenda</li>
<li>(02:21) - Workshop: Hacking AI-LLM Applications</li>
<li>(02:49) - Training: Attacking, Defending, and Leveraging AI-LLM Systems</li>
<li>(03:11) - BHIS AI Security Assessments</li>
<li>(03:24) - AI Security Ops Podcast</li>
<li>(03:56) - LLM Security Introduction</li>
<li>(05:57) - Foundation Model Training</li>
<li>(09:35) - Chatbot</li>
<li>(14:58) - AI Agents</li>
<li>(17:56) - LLM Safety Versus Security</li>
<li>(23:54) - OWASP Top 10 for LLM Applications</li>
<li>(24:33) - – Prompt Injection</li>
<li>(29:11) - – Sensitive Information Disclosure</li>
<li>(32:46) - – Supply Chain</li>
<li>(37:02) - – Data and Model Poisoning</li>
<li>(40:18) - – Improper Output Handling</li>
<li>(41:51) - – Exessive Agency</li>
<li>(43:47) - – System Prompt Leakage</li>
<li>(45:17) - – Vector and Embedding Weaknesses</li>
<li>(46:49) - – Misinformation</li>
<li>(49:45) - – Unbounded Consumption</li>
<li>(52:10) - Red Team Methodology</li>
<li>(53:06) - Threat Modeling an LLM App</li>
<li>(54:41) - Defense-in-Depth for LLM Apps</li>
<li>(55:49) - Red Team Tools &amp; Frameworks</li>
<li>(56:31) - Key Takeaways</li>
<li>(01:00:34) - Q&amp;A</li>
</ul><br><strong><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://anticasts.transistor.fm/people/brian-fehrman">Brian Fehrman</a> - Guest</li>
  <li><a href="https://anticasts.transistor.fm/people/zach-hill">Zach Hill</a> - Host</li>
  <li><a href="https://anticasts.transistor.fm/people/derek-banks">Derek Banks</a> - Guest</li>
  <li><a href="https://anticasts.transistor.fm/people/meagan-bentley">Meagan Bentley</a> - Producer</li>
</ul></strong><p><strong>Chat with your fellow attendees in the BHIS Discord server:</strong><br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>in the #🔴live-chat channel</p><p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </strong><br><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p>✏️ <strong>Training with Brian and Derek:</strong><br>&gt;<a href="https://www.antisyphontraining.com/product/workshop-hacking-ai-llm-applications-with-brian-fehrman-joff-thyer-and-derek-banks/">Workshop: Hacking AI-LLM Applications</a><br>&gt;<a href="https://www.antisyphontraining.com/product/attacking-defending-and-leveraging-ai-llm-systems/">Attacking, Defending, and Leveraging AI-LLM Systems</a></p><p><strong><a href="https://www.youtube.com/watch?v=P-5DgsGkJbQ" title="Click here to watch this episode on YouTube.">Click here to watch this episode on YouTube.</a><br>
</strong></p><p>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p><p><a href="https://share.transistor.fm/s/09e57328/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Summary</strong><br>Are you currently testing your AI systems the same way you test traditional apps?</p><p>🛝 Webcast Slides<br><a href="https://www.antisyphontraining.com/wp-content/uploads/2026/02/AI-LLM-Red-Teaming.pdf">https://www.antisyphontraining.com/wp-content/uploads/2026/02/AI-LLM-Red-Teaming.pdf</a></p><p>Join AI researchers Brian Fehrman and Derek Banks for a free one-hour training session that breaks down the OWASP Top 10 AI-LLM risks clearly and practically.</p><p>You’ll learn in this Antisyphon Anti-cast how LLM security issues show up in real systems, how attackers test them, and what to focus on to secure AI applications with a practical, security-first mindset.</p><p><br><strong>Chapters</strong><br></p><ul><li>(00:00) - Intro</li>
<li>(01:09) - Webcast Agenda</li>
<li>(02:21) - Workshop: Hacking AI-LLM Applications</li>
<li>(02:49) - Training: Attacking, Defending, and Leveraging AI-LLM Systems</li>
<li>(03:11) - BHIS AI Security Assessments</li>
<li>(03:24) - AI Security Ops Podcast</li>
<li>(03:56) - LLM Security Introduction</li>
<li>(05:57) - Foundation Model Training</li>
<li>(09:35) - Chatbot</li>
<li>(14:58) - AI Agents</li>
<li>(17:56) - LLM Safety Versus Security</li>
<li>(23:54) - OWASP Top 10 for LLM Applications</li>
<li>(24:33) - – Prompt Injection</li>
<li>(29:11) - – Sensitive Information Disclosure</li>
<li>(32:46) - – Supply Chain</li>
<li>(37:02) - – Data and Model Poisoning</li>
<li>(40:18) - – Improper Output Handling</li>
<li>(41:51) - – Exessive Agency</li>
<li>(43:47) - – System Prompt Leakage</li>
<li>(45:17) - – Vector and Embedding Weaknesses</li>
<li>(46:49) - – Misinformation</li>
<li>(49:45) - – Unbounded Consumption</li>
<li>(52:10) - Red Team Methodology</li>
<li>(53:06) - Threat Modeling an LLM App</li>
<li>(54:41) - Defense-in-Depth for LLM Apps</li>
<li>(55:49) - Red Team Tools &amp; Frameworks</li>
<li>(56:31) - Key Takeaways</li>
<li>(01:00:34) - Q&amp;A</li>
</ul><br><strong><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://anticasts.transistor.fm/people/brian-fehrman">Brian Fehrman</a> - Guest</li>
  <li><a href="https://anticasts.transistor.fm/people/zach-hill">Zach Hill</a> - Host</li>
  <li><a href="https://anticasts.transistor.fm/people/derek-banks">Derek Banks</a> - Guest</li>
  <li><a href="https://anticasts.transistor.fm/people/meagan-bentley">Meagan Bentley</a> - Producer</li>
</ul></strong><p><strong>Chat with your fellow attendees in the BHIS Discord server:</strong><br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>in the #🔴live-chat channel</p><p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </strong><br><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p>✏️ <strong>Training with Brian and Derek:</strong><br>&gt;<a href="https://www.antisyphontraining.com/product/workshop-hacking-ai-llm-applications-with-brian-fehrman-joff-thyer-and-derek-banks/">Workshop: Hacking AI-LLM Applications</a><br>&gt;<a href="https://www.antisyphontraining.com/product/attacking-defending-and-leveraging-ai-llm-systems/">Attacking, Defending, and Leveraging AI-LLM Systems</a></p><p><strong><a href="https://www.youtube.com/watch?v=P-5DgsGkJbQ" title="Click here to watch this episode on YouTube.">Click here to watch this episode on YouTube.</a><br>
</strong></p><p>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p><p><a href="https://share.transistor.fm/s/09e57328/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </content:encoded>
      <pubDate>Wed, 25 Feb 2026 15:32:34 -0500</pubDate>
      <author>Antisyphon Training</author>
      <enclosure url="https://media.transistor.fm/09e57328/a2277abb.mp3" length="67394969" type="audio/mpeg"/>
      <itunes:author>Antisyphon Training</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/DmG02NGbLHcL84XhL1RoJExZPhUvW6YwSQ6nh4iW57c/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iMGI3/ODE4ZTRiZWRlNDI2/N2U3M2M0ZjFlN2U2/YWY3MS5wbmc.jpg"/>
      <itunes:duration>3991</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>Summary</strong><br>Are you currently testing your AI systems the same way you test traditional apps?</p><p>🛝 Webcast Slides<br><a href="https://www.antisyphontraining.com/wp-content/uploads/2026/02/AI-LLM-Red-Teaming.pdf">https://www.antisyphontraining.com/wp-content/uploads/2026/02/AI-LLM-Red-Teaming.pdf</a></p><p>Join AI researchers Brian Fehrman and Derek Banks for a free one-hour training session that breaks down the OWASP Top 10 AI-LLM risks clearly and practically.</p><p>You’ll learn in this Antisyphon Anti-cast how LLM security issues show up in real systems, how attackers test them, and what to focus on to secure AI applications with a practical, security-first mindset.</p><p><br><strong>Chapters</strong><br></p><ul><li>(00:00) - Intro</li>
<li>(01:09) - Webcast Agenda</li>
<li>(02:21) - Workshop: Hacking AI-LLM Applications</li>
<li>(02:49) - Training: Attacking, Defending, and Leveraging AI-LLM Systems</li>
<li>(03:11) - BHIS AI Security Assessments</li>
<li>(03:24) - AI Security Ops Podcast</li>
<li>(03:56) - LLM Security Introduction</li>
<li>(05:57) - Foundation Model Training</li>
<li>(09:35) - Chatbot</li>
<li>(14:58) - AI Agents</li>
<li>(17:56) - LLM Safety Versus Security</li>
<li>(23:54) - OWASP Top 10 for LLM Applications</li>
<li>(24:33) - – Prompt Injection</li>
<li>(29:11) - – Sensitive Information Disclosure</li>
<li>(32:46) - – Supply Chain</li>
<li>(37:02) - – Data and Model Poisoning</li>
<li>(40:18) - – Improper Output Handling</li>
<li>(41:51) - – Exessive Agency</li>
<li>(43:47) - – System Prompt Leakage</li>
<li>(45:17) - – Vector and Embedding Weaknesses</li>
<li>(46:49) - – Misinformation</li>
<li>(49:45) - – Unbounded Consumption</li>
<li>(52:10) - Red Team Methodology</li>
<li>(53:06) - Threat Modeling an LLM App</li>
<li>(54:41) - Defense-in-Depth for LLM Apps</li>
<li>(55:49) - Red Team Tools &amp; Frameworks</li>
<li>(56:31) - Key Takeaways</li>
<li>(01:00:34) - Q&amp;A</li>
</ul><br><strong><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://anticasts.transistor.fm/people/brian-fehrman">Brian Fehrman</a> - Guest</li>
  <li><a href="https://anticasts.transistor.fm/people/zach-hill">Zach Hill</a> - Host</li>
  <li><a href="https://anticasts.transistor.fm/people/derek-banks">Derek Banks</a> - Guest</li>
  <li><a href="https://anticasts.transistor.fm/people/meagan-bentley">Meagan Bentley</a> - Producer</li>
</ul></strong><p><strong>Chat with your fellow attendees in the BHIS Discord server:</strong><br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>in the #🔴live-chat channel</p><p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </strong><br><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p>✏️ <strong>Training with Brian and Derek:</strong><br>&gt;<a href="https://www.antisyphontraining.com/product/workshop-hacking-ai-llm-applications-with-brian-fehrman-joff-thyer-and-derek-banks/">Workshop: Hacking AI-LLM Applications</a><br>&gt;<a href="https://www.antisyphontraining.com/product/attacking-defending-and-leveraging-ai-llm-systems/">Attacking, Defending, and Leveraging AI-LLM Systems</a></p><p><strong><a href="https://www.youtube.com/watch?v=P-5DgsGkJbQ" title="Click here to watch this episode on YouTube.">Click here to watch this episode on YouTube.</a><br>
</strong></p><p>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p><p><a href="https://share.transistor.fm/s/09e57328/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Guest" href="https://www.blackhillsinfosec.com/team/brian-fehrman/" img="https://img.transistorcdn.com/nRT76_oa-9m5eeqKZfRuds3ATbmsdy5UDAgT6eJ7S_w/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9mYTk1/ODI1YTlhYWQ0MTFj/ZDk1ZjkwNjRkZGY4/ODk1Zi5qcGc.jpg">Brian Fehrman</podcast:person>
      <podcast:person role="Host" href="https://www.antisyphontraining.com/instructor/zach-hill-instructor/" img="https://img.transistorcdn.com/GrK_hNtXoU0p-hSFnD8hgtw3mArlg3R_Cd8iEhhnEJw/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83NDk0/OTI5NjZiYWNiZDA3/ZWEwZGU4ZDUxNzQy/MTJmYy5qcGc.jpg">Zach Hill</podcast:person>
      <podcast:person role="Guest" href="https://www.blackhillsinfosec.com/team/derek-banks/" img="https://img.transistorcdn.com/4x8ApEZdLSjv-KEJrbiWfkc1KNkHrOvQGd4mAcKs6MQ/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jNTcy/NDQ4Zjc3NmFhNDY2/YjBhNWU5YTk1ZDc4/YmI3OS5qcGc.jpg">Derek Banks</podcast:person>
      <podcast:person role="Producer" href="https://anticasts.transistor.fm/people/meagan-bentley">Meagan Bentley</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/09e57328/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/09e57328/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/09e57328/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/09e57328/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/09e57328/transcription" type="text/html"/>
      <podcast:chapters url="https://share.transistor.fm/s/09e57328/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Adapting to Active Directory Security Enhancements with Eric Kuehn</title>
      <itunes:episode>6</itunes:episode>
      <podcast:episode>6</podcast:episode>
      <itunes:title>Adapting to Active Directory Security Enhancements with Eric Kuehn</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">850f9056-6076-474f-acba-ab0722040a46</guid>
      <link>https://share.transistor.fm/s/4b69e739</link>
      <description>
        <![CDATA[<p><strong>Summary</strong><br>Are your go-to Active Directory attacks quietly failing without you noticing?</p><p>Join Eric Kuehn, Principal Security Consultant at Secure Ideas, for a free one-hour training session that takes a deep dive into the security enhancements Microsoft has introduced to Active Directory over the past few years and how they are reshaping the way penetration testers and defenders operate.</p><p>You’ll learn how long-reliable attack paths now break, how successful attacks may leave new and unexpected traces, and what these changes mean for staying stealthy during an engagement.</p><p>Eric will teach you the latest AD hardening features, the new detection opportunities they create, and the practical changes testers and defenders can make to improve their tradecraft right away.</p><p><strong>Chapters</strong><br></p><ul><li>(00:00) - Intro</li>
<li>(01:29) - I am Eric Kuehn</li>
<li>(05:43) - “Recent” Change Timeline</li>
<li>(09:14) - 2026 And Beyond</li>
<li>(13:34) - NTLM Finally Going Away</li>
<li>(19:28) - Kerberos PAC Signatures</li>
<li>(23:23) - What Does It Mean to Us?</li>
<li>(25:18) - Certificate-Based Authentication</li>
<li>(29:46) - Non-Security Events for PAC and Certificate Issues</li>
<li>(31:07) - Certificate Services Audit Events</li>
<li>(32:11) - Kerberos Enhancements</li>
<li>(35:18) - In Summary</li>
<li>(37:59) - Demo Time</li>
<li>(49:25) - Q&amp;A</li>
</ul><br><strong>Credits</strong><br><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://anticasts.transistor.fm/people/zach-hill">Zach Hill</a> - Host</li>
  <li><a href="https://anticasts.transistor.fm/people/eric-kuehn">Eric Kuehn</a> - Guest</li>
  <li><a href="https://anticasts.transistor.fm/people/meagan-bentley">Meagan Bentley</a> - Producer</li>
  <li><a href="https://anticasts.transistor.fm/people/jennifer-shannon">Jennifer Shannon</a> - Guest</li>
</ul><br><strong>Chat with your fellow attendees in the BHIS Discord server:</strong><br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>in the #🔴live-chat channel<p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </strong><br><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p><strong><a href="https://www.youtube.com/watch?v=v7BHJIRwCLQ" title="Click here to watch a video of this episode.">Click here to watch a video of this episode.</a><br>
</strong></p><p>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p><p><a href="https://share.transistor.fm/s/4b69e739/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Summary</strong><br>Are your go-to Active Directory attacks quietly failing without you noticing?</p><p>Join Eric Kuehn, Principal Security Consultant at Secure Ideas, for a free one-hour training session that takes a deep dive into the security enhancements Microsoft has introduced to Active Directory over the past few years and how they are reshaping the way penetration testers and defenders operate.</p><p>You’ll learn how long-reliable attack paths now break, how successful attacks may leave new and unexpected traces, and what these changes mean for staying stealthy during an engagement.</p><p>Eric will teach you the latest AD hardening features, the new detection opportunities they create, and the practical changes testers and defenders can make to improve their tradecraft right away.</p><p><strong>Chapters</strong><br></p><ul><li>(00:00) - Intro</li>
<li>(01:29) - I am Eric Kuehn</li>
<li>(05:43) - “Recent” Change Timeline</li>
<li>(09:14) - 2026 And Beyond</li>
<li>(13:34) - NTLM Finally Going Away</li>
<li>(19:28) - Kerberos PAC Signatures</li>
<li>(23:23) - What Does It Mean to Us?</li>
<li>(25:18) - Certificate-Based Authentication</li>
<li>(29:46) - Non-Security Events for PAC and Certificate Issues</li>
<li>(31:07) - Certificate Services Audit Events</li>
<li>(32:11) - Kerberos Enhancements</li>
<li>(35:18) - In Summary</li>
<li>(37:59) - Demo Time</li>
<li>(49:25) - Q&amp;A</li>
</ul><br><strong>Credits</strong><br><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://anticasts.transistor.fm/people/zach-hill">Zach Hill</a> - Host</li>
  <li><a href="https://anticasts.transistor.fm/people/eric-kuehn">Eric Kuehn</a> - Guest</li>
  <li><a href="https://anticasts.transistor.fm/people/meagan-bentley">Meagan Bentley</a> - Producer</li>
  <li><a href="https://anticasts.transistor.fm/people/jennifer-shannon">Jennifer Shannon</a> - Guest</li>
</ul><br><strong>Chat with your fellow attendees in the BHIS Discord server:</strong><br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>in the #🔴live-chat channel<p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </strong><br><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p><strong><a href="https://www.youtube.com/watch?v=v7BHJIRwCLQ" title="Click here to watch a video of this episode.">Click here to watch a video of this episode.</a><br>
</strong></p><p>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p><p><a href="https://share.transistor.fm/s/4b69e739/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </content:encoded>
      <pubDate>Mon, 23 Feb 2026 17:34:12 -0500</pubDate>
      <author>Antisyphon Training</author>
      <enclosure url="https://media.transistor.fm/4b69e739/28d49d77.mp3" length="60756477" type="audio/mpeg"/>
      <itunes:author>Antisyphon Training</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/iovKXzyLTT2aNdIBTojzC65eLxTwC6xyFrbtBVgxbbY/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zZjBh/ZGQ2ZDI5YTAwYjE2/MDlmMmNjOWFhNzE3/ZmIzNC5wbmc.jpg"/>
      <itunes:duration>3661</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>Summary</strong><br>Are your go-to Active Directory attacks quietly failing without you noticing?</p><p>Join Eric Kuehn, Principal Security Consultant at Secure Ideas, for a free one-hour training session that takes a deep dive into the security enhancements Microsoft has introduced to Active Directory over the past few years and how they are reshaping the way penetration testers and defenders operate.</p><p>You’ll learn how long-reliable attack paths now break, how successful attacks may leave new and unexpected traces, and what these changes mean for staying stealthy during an engagement.</p><p>Eric will teach you the latest AD hardening features, the new detection opportunities they create, and the practical changes testers and defenders can make to improve their tradecraft right away.</p><p><strong>Chapters</strong><br></p><ul><li>(00:00) - Intro</li>
<li>(01:29) - I am Eric Kuehn</li>
<li>(05:43) - “Recent” Change Timeline</li>
<li>(09:14) - 2026 And Beyond</li>
<li>(13:34) - NTLM Finally Going Away</li>
<li>(19:28) - Kerberos PAC Signatures</li>
<li>(23:23) - What Does It Mean to Us?</li>
<li>(25:18) - Certificate-Based Authentication</li>
<li>(29:46) - Non-Security Events for PAC and Certificate Issues</li>
<li>(31:07) - Certificate Services Audit Events</li>
<li>(32:11) - Kerberos Enhancements</li>
<li>(35:18) - In Summary</li>
<li>(37:59) - Demo Time</li>
<li>(49:25) - Q&amp;A</li>
</ul><br><strong>Credits</strong><br><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://anticasts.transistor.fm/people/zach-hill">Zach Hill</a> - Host</li>
  <li><a href="https://anticasts.transistor.fm/people/eric-kuehn">Eric Kuehn</a> - Guest</li>
  <li><a href="https://anticasts.transistor.fm/people/meagan-bentley">Meagan Bentley</a> - Producer</li>
  <li><a href="https://anticasts.transistor.fm/people/jennifer-shannon">Jennifer Shannon</a> - Guest</li>
</ul><br><strong>Chat with your fellow attendees in the BHIS Discord server:</strong><br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>in the #🔴live-chat channel<p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </strong><br><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p><strong><a href="https://www.youtube.com/watch?v=v7BHJIRwCLQ" title="Click here to watch a video of this episode.">Click here to watch a video of this episode.</a><br>
</strong></p><p>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p><p><a href="https://share.transistor.fm/s/4b69e739/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.antisyphontraining.com/instructor/zach-hill-instructor/" img="https://img.transistorcdn.com/GrK_hNtXoU0p-hSFnD8hgtw3mArlg3R_Cd8iEhhnEJw/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83NDk0/OTI5NjZiYWNiZDA3/ZWEwZGU4ZDUxNzQy/MTJmYy5qcGc.jpg">Zach Hill</podcast:person>
      <podcast:person role="Guest" href="https://www.antisyphontraining.com/instructor/eric-kuehn/" img="https://img.transistorcdn.com/64ze4M-JzJjUbl5opOAPESSI6q2BbGbvZIiLDrfVPM8/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iNWIz/MDE0OTdlNzEwZmFk/N2JlZTVkNmFmZGIz/MzkwYy5qcGc.jpg">Eric Kuehn</podcast:person>
      <podcast:person role="Producer" href="https://anticasts.transistor.fm/people/meagan-bentley">Meagan Bentley</podcast:person>
      <podcast:person role="Guest" href="https://www.antisyphontraining.com/instructor/jennifer-shannon/" img="https://img.transistorcdn.com/FgSe5pzJZEVO1l7chJzegiCJkAjIU9An3bCKkahB16A/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iMDhi/YjliOTgwZWQ1NDE1/YzZiNTdjNjE3ZmRh/ZjRmNS5qcGc.jpg">Jennifer Shannon</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/4b69e739/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/4b69e739/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/4b69e739/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/4b69e739/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/4b69e739/transcription" type="text/html"/>
      <podcast:chapters url="https://share.transistor.fm/s/4b69e739/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>How to Strengthen M365 Exchange Online Configurations with Kevin Klingbile</title>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>How to Strengthen M365 Exchange Online Configurations with Kevin Klingbile</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4d8d58fd-ea46-4372-99ea-45ba4a81102e</guid>
      <link>https://share.transistor.fm/s/b50b5a95</link>
      <description>
        <![CDATA[<p><strong>Summary</strong><br>When was the last time you reviewed the security of your mail flow rules?<br> <br>Join instructor Kevin Klingbile to learn how attackers exploit weak mail flow rules and how to stop them.<br> <br>Kevin will teach you through real-world examples of rule bypasses, show you how to spot risky configurations, and teach practical steps to secure your email environment.<br> <br>In this free one-hour Antisyphon Anti-cast, you'll strengthen your defenses and make sure your mail flow rules aren’t the next easy target.</p><p><strong>🛝 Webcast Slides:</strong><br><a href="https://www.antisyphontraining.com/wp-content/uploads/2026/02/strengthen-m365-configs-kevin-klingbile.pdf">https://www.antisyphontraining.com/wp-content/uploads/2026/02/strengthen-m365-configs-kevin-klingbile.pdf</a></p><p>✏️ <strong>Antisyphon Training with Kevin:</strong><br><a href="https://www.antisyphontraining.com/product/defending-m365-azure-with-kevin-klingbile/">https://www.antisyphontraining.com/product/defending-m365-azure-with-kevin-klingbile/</a></p><p><strong>Chapters</strong><br></p><ul><li>(00:00) - Intro – How to Strengthen M365 Exchange Online Configurations with Kevin Klingbile</li>
<li>(01:12) - Excahnge Online</li>
<li>(03:47) - Exchange Mail Flow Rules</li>
<li>(04:20) - Rule Requirements - Conditions</li>
<li>(08:36) - Rule Settings</li>
<li>(12:15) - Rule Flow</li>
<li>(18:34) - Creating “Good” Rules</li>
<li>(25:22) - Rule Example - Conditions vs Description</li>
<li>(28:29) - Rule Function - Message Sent to Organization</li>
<li>(29:39) - Reply to email chain and...</li>
<li>(30:56) - Microsoft’s Solution! (Sort of)</li>
<li>(32:10) - Mail Rule vs Disclaimer</li>
<li>(32:20) - Modify Original Rule</li>
<li>(33:03) - New message “Bypassing” Subject Rule</li>
<li>(35:03) - Common Rule Issues</li>
<li>(41:44) - Phishing Products</li>
<li>(42:39) - X-Header Bypass Examples</li>
<li>(42:53) - X-Header Example - 2</li>
<li>(43:46) - Direct Send</li>
<li>(45:50) - Direct Send - Transport Rules</li>
<li>(46:52) - Disable Direct Send**</li>
<li>(47:58) - DMARC</li>
<li>(48:26) - Securing Exchange Online</li>
<li>(48:59) - Q&amp;A Start</li>
<li>(57:46) - Other Antisyphon Events</li>
<li>(01:05:35) - Final Thoughts</li>
</ul><br><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://anticasts.transistor.fm/people/zach-hill">Zach Hill</a> - Host</li>
  <li><a href="https://anticasts.transistor.fm/people/meagan-bentley">Meagan Bentley</a> - Producer</li>
  <li><a href="https://anticasts.transistor.fm/people/cj-cox">CJ Cox</a> - Guest</li>
  <li><a href="https://anticasts.transistor.fm/people/kevin-klingbile">Kevin Klingbile</a> - Guest</li>
</ul><br><strong>Chat with your fellow attendees in the BHIS Discord server:</strong><br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>in the #🔴live-chat channel<p><strong><a href="https://www.youtube.com/watch?v=TFtHWDP_U90" title="Click here to watch a video of this episode.">Click here to watch a video of this episode.</a><br>
</strong></p><p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </strong><br><a href="https://poweredbybhis.com/">https://poweredbybhis.com</a></p><p>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p><p><a href="https://share.transistor.fm/s/b50b5a95/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Summary</strong><br>When was the last time you reviewed the security of your mail flow rules?<br> <br>Join instructor Kevin Klingbile to learn how attackers exploit weak mail flow rules and how to stop them.<br> <br>Kevin will teach you through real-world examples of rule bypasses, show you how to spot risky configurations, and teach practical steps to secure your email environment.<br> <br>In this free one-hour Antisyphon Anti-cast, you'll strengthen your defenses and make sure your mail flow rules aren’t the next easy target.</p><p><strong>🛝 Webcast Slides:</strong><br><a href="https://www.antisyphontraining.com/wp-content/uploads/2026/02/strengthen-m365-configs-kevin-klingbile.pdf">https://www.antisyphontraining.com/wp-content/uploads/2026/02/strengthen-m365-configs-kevin-klingbile.pdf</a></p><p>✏️ <strong>Antisyphon Training with Kevin:</strong><br><a href="https://www.antisyphontraining.com/product/defending-m365-azure-with-kevin-klingbile/">https://www.antisyphontraining.com/product/defending-m365-azure-with-kevin-klingbile/</a></p><p><strong>Chapters</strong><br></p><ul><li>(00:00) - Intro – How to Strengthen M365 Exchange Online Configurations with Kevin Klingbile</li>
<li>(01:12) - Excahnge Online</li>
<li>(03:47) - Exchange Mail Flow Rules</li>
<li>(04:20) - Rule Requirements - Conditions</li>
<li>(08:36) - Rule Settings</li>
<li>(12:15) - Rule Flow</li>
<li>(18:34) - Creating “Good” Rules</li>
<li>(25:22) - Rule Example - Conditions vs Description</li>
<li>(28:29) - Rule Function - Message Sent to Organization</li>
<li>(29:39) - Reply to email chain and...</li>
<li>(30:56) - Microsoft’s Solution! (Sort of)</li>
<li>(32:10) - Mail Rule vs Disclaimer</li>
<li>(32:20) - Modify Original Rule</li>
<li>(33:03) - New message “Bypassing” Subject Rule</li>
<li>(35:03) - Common Rule Issues</li>
<li>(41:44) - Phishing Products</li>
<li>(42:39) - X-Header Bypass Examples</li>
<li>(42:53) - X-Header Example - 2</li>
<li>(43:46) - Direct Send</li>
<li>(45:50) - Direct Send - Transport Rules</li>
<li>(46:52) - Disable Direct Send**</li>
<li>(47:58) - DMARC</li>
<li>(48:26) - Securing Exchange Online</li>
<li>(48:59) - Q&amp;A Start</li>
<li>(57:46) - Other Antisyphon Events</li>
<li>(01:05:35) - Final Thoughts</li>
</ul><br><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://anticasts.transistor.fm/people/zach-hill">Zach Hill</a> - Host</li>
  <li><a href="https://anticasts.transistor.fm/people/meagan-bentley">Meagan Bentley</a> - Producer</li>
  <li><a href="https://anticasts.transistor.fm/people/cj-cox">CJ Cox</a> - Guest</li>
  <li><a href="https://anticasts.transistor.fm/people/kevin-klingbile">Kevin Klingbile</a> - Guest</li>
</ul><br><strong>Chat with your fellow attendees in the BHIS Discord server:</strong><br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>in the #🔴live-chat channel<p><strong><a href="https://www.youtube.com/watch?v=TFtHWDP_U90" title="Click here to watch a video of this episode.">Click here to watch a video of this episode.</a><br>
</strong></p><p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </strong><br><a href="https://poweredbybhis.com/">https://poweredbybhis.com</a></p><p>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p><p><a href="https://share.transistor.fm/s/b50b5a95/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </content:encoded>
      <pubDate>Thu, 05 Feb 2026 17:15:12 -0500</pubDate>
      <author>Antisyphon Training</author>
      <enclosure url="https://media.transistor.fm/b50b5a95/c64c2b1b.mp3" length="67264546" type="audio/mpeg"/>
      <itunes:author>Antisyphon Training</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/XykYSIY_iBYvHNHyhmMtAq5UxXm-qd_JCX0KuIWPoWM/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lMGYy/MjY5MWJjNDUzNTAz/NzExOWUwNjAyZjQ0/YjI4Ny5wbmc.jpg"/>
      <itunes:duration>3964</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>Summary</strong><br>When was the last time you reviewed the security of your mail flow rules?<br> <br>Join instructor Kevin Klingbile to learn how attackers exploit weak mail flow rules and how to stop them.<br> <br>Kevin will teach you through real-world examples of rule bypasses, show you how to spot risky configurations, and teach practical steps to secure your email environment.<br> <br>In this free one-hour Antisyphon Anti-cast, you'll strengthen your defenses and make sure your mail flow rules aren’t the next easy target.</p><p><strong>🛝 Webcast Slides:</strong><br><a href="https://www.antisyphontraining.com/wp-content/uploads/2026/02/strengthen-m365-configs-kevin-klingbile.pdf">https://www.antisyphontraining.com/wp-content/uploads/2026/02/strengthen-m365-configs-kevin-klingbile.pdf</a></p><p>✏️ <strong>Antisyphon Training with Kevin:</strong><br><a href="https://www.antisyphontraining.com/product/defending-m365-azure-with-kevin-klingbile/">https://www.antisyphontraining.com/product/defending-m365-azure-with-kevin-klingbile/</a></p><p><strong>Chapters</strong><br></p><ul><li>(00:00) - Intro – How to Strengthen M365 Exchange Online Configurations with Kevin Klingbile</li>
<li>(01:12) - Excahnge Online</li>
<li>(03:47) - Exchange Mail Flow Rules</li>
<li>(04:20) - Rule Requirements - Conditions</li>
<li>(08:36) - Rule Settings</li>
<li>(12:15) - Rule Flow</li>
<li>(18:34) - Creating “Good” Rules</li>
<li>(25:22) - Rule Example - Conditions vs Description</li>
<li>(28:29) - Rule Function - Message Sent to Organization</li>
<li>(29:39) - Reply to email chain and...</li>
<li>(30:56) - Microsoft’s Solution! (Sort of)</li>
<li>(32:10) - Mail Rule vs Disclaimer</li>
<li>(32:20) - Modify Original Rule</li>
<li>(33:03) - New message “Bypassing” Subject Rule</li>
<li>(35:03) - Common Rule Issues</li>
<li>(41:44) - Phishing Products</li>
<li>(42:39) - X-Header Bypass Examples</li>
<li>(42:53) - X-Header Example - 2</li>
<li>(43:46) - Direct Send</li>
<li>(45:50) - Direct Send - Transport Rules</li>
<li>(46:52) - Disable Direct Send**</li>
<li>(47:58) - DMARC</li>
<li>(48:26) - Securing Exchange Online</li>
<li>(48:59) - Q&amp;A Start</li>
<li>(57:46) - Other Antisyphon Events</li>
<li>(01:05:35) - Final Thoughts</li>
</ul><br><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://anticasts.transistor.fm/people/zach-hill">Zach Hill</a> - Host</li>
  <li><a href="https://anticasts.transistor.fm/people/meagan-bentley">Meagan Bentley</a> - Producer</li>
  <li><a href="https://anticasts.transistor.fm/people/cj-cox">CJ Cox</a> - Guest</li>
  <li><a href="https://anticasts.transistor.fm/people/kevin-klingbile">Kevin Klingbile</a> - Guest</li>
</ul><br><strong>Chat with your fellow attendees in the BHIS Discord server:</strong><br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>in the #🔴live-chat channel<p><strong><a href="https://www.youtube.com/watch?v=TFtHWDP_U90" title="Click here to watch a video of this episode.">Click here to watch a video of this episode.</a><br>
</strong></p><p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </strong><br><a href="https://poweredbybhis.com/">https://poweredbybhis.com</a></p><p>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p><p><a href="https://share.transistor.fm/s/b50b5a95/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.antisyphontraining.com/instructor/zach-hill-instructor/" img="https://img.transistorcdn.com/GrK_hNtXoU0p-hSFnD8hgtw3mArlg3R_Cd8iEhhnEJw/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83NDk0/OTI5NjZiYWNiZDA3/ZWEwZGU4ZDUxNzQy/MTJmYy5qcGc.jpg">Zach Hill</podcast:person>
      <podcast:person role="Producer" href="https://anticasts.transistor.fm/people/meagan-bentley">Meagan Bentley</podcast:person>
      <podcast:person role="Guest" href="https://www.blackhillsinfosec.com/team/cj-cox/" img="https://img.transistorcdn.com/EN_ZKJTXbR0W0PY85rrx9qUuNT173PZSO2_kHIMk450/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iOWU1/NWI4NmNjODQ5NTRh/ZjY5MzBmY2E2ZWY0/MmMzMC5qcGc.jpg">CJ Cox</podcast:person>
      <podcast:person role="Guest" href="https://www.blackhillsinfosec.com/team/kevin-klingbile/" img="https://img.transistorcdn.com/_Vp4Fyw08IPiSEgt-RmGwEhPhSl9w9UVy9enZOxsl6c/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hMmY3/M2IxOGZjMzFmMzYx/YzQ1YzViMTg0MTg2/NzA2YS5qcGc.jpg">Kevin Klingbile</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/b50b5a95/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/b50b5a95/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/b50b5a95/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/b50b5a95/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/b50b5a95/transcription" type="text/html"/>
      <podcast:chapters url="https://share.transistor.fm/s/b50b5a95/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Effective AI for Practical SecOps Workflows w/ Hayden Covington</title>
      <itunes:episode>4</itunes:episode>
      <podcast:episode>4</podcast:episode>
      <itunes:title>Effective AI for Practical SecOps Workflows w/ Hayden Covington</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0211c07e-4787-41e9-8434-af437d03d921</guid>
      <link>https://share.transistor.fm/s/22771158</link>
      <description>
        <![CDATA[<p>Which AI workflows are already running in production SOCs right now, and which ones could you implement by next week?</p><p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits:</strong><br><a href="https://poweredbybhis.com">https://poweredbybhis.com</a> </p><p><strong>🛝 Webcast Slides:</strong><br><a href="https://www.antisyphontraining.com/wp-content/uploads/2026/01/Effective-AI-for-Practical-SecOps.pdf">https://www.antisyphontraining.com/wp-content/uploads/2026/01/Effective-AI-for-Practical-SecOps.pdf</a></p><p><strong>✏️ Learn from Hayden on Antisyphon Training:</strong><br><a href="https://www.antisyphontraining.com/search/Hayden">https://www.antisyphontraining.com/search/Hayden</a></p><p>Join Hayden Covington (Black Hills Infosec - SOC SecOps Lead) for a free one-hour training session to learn how to augment security analysts with AI through practical, tested workflows. <br>Cut through the noise of vendor demos, hype, and ChatGPT wrappers. </p><p>Hayden will teach you practical AI workflows that help analysts work faster and smarter without replacing their judgment. <br>Learn real techniques for detection engineering, case management, and QA, plus where AI truly helps (and where it doesn’t) so you can apply it right away.</p><p><strong>Chat with your fellow attendees in the BHIS Discord server:</strong><br><a href="https://discord.gg/bhis"><strong>https://discord.gg/bhis</strong></a><br>in the<strong> #🔴live-chat</strong> channel</p><p><strong>Chapters:<br><ul><li>(00:00) - INTRO – 2026-01-28 Effective AI Hayden</li>
<li>(02:29) - About Hayden</li>
<li>(03:33) - What This Session Is (and Isn't)</li>
<li>(04:26) - Let's Get Something Straight</li>
<li>(06:11) - What Augmentation Actually Looks Like</li>
<li>(12:03) - Before You Implement Anything...STOP</li>
<li>(13:14) - Consideration: Cost</li>
<li>(18:30) - Consideration: Policy &amp; Legal</li>
<li>(20:41) - Consideration: Data Sensitivity</li>
<li>(21:21) - Consideration: Team Buy-In</li>
<li>(23:35) - Consideration: PEBKAC</li>
<li>(27:55) - How We'll Break Down the Use Cases</li>
<li>(29:14) - Start This Week! – AI Projects: Curated Team Agents</li>
<li>(32:12) - Building a Good Agent</li>
<li>(33:18) - Detection Code Review Agent</li>
<li>(35:31) - Detection Code Review: Example Prompt (GH)</li>
<li>(37:01) - Why Markdown and Change Controlled Prompts Win</li>
<li>(38:38) - Start This Week! – SOC Analyst Agent</li>
<li>(40:20) - SOC Analyst Agent: Example Prompt</li>
<li>(41:56) - Other Agent Examples</li>
<li>(42:53) - Quick Wins: Raycast InfoSec Extensions</li>
<li>(44:44) - Raycast Example</li>
<li>(45:12) - Build This Month! – Case Management: Alert Titles &amp; Summaries</li>
<li>(46:23) - Case Management: Example</li>
<li>(47:10) - Case Management: Sample Implementation</li>
<li>(48:08) - Build This Month! – Quality Assurance: Automated Ticket Review</li>
<li>(48:44) - QA Workflow Options</li>
<li>(49:45) - QA: What It Catches</li>
<li>(50:15) - QA: Sample Prompt</li>
<li>(51:37) - Build This Month! – Detection Engineering: First-Draft Generation</li>
<li>(53:12) - Detection Engineering Workflow</li>
<li>(54:04) - Detection Engineering: Starter Approach</li>
<li>(54:45) - Detection Engineering: Sample Prompt</li>
<li>(56:58) - Where AI Often Fails</li>
<li>(59:27) - Key Takeaways</li>
<li>(01:00:31) - Resources &amp; Next Steps</li>
<li>(01:01:39) - QA Start</li>
<li>(01:04:31) - Patterson's Workshop</li>
</ul><br><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://anticasts.transistor.fm/people/hayden-covington">Hayden Covington</a> - Guest</li>
  <li><a href="https://anticasts.transistor.fm/people/meagan-bentley">Meagan Bentley</a> - Producer</li>
  <li><a href="https://anticasts.transistor.fm/people/jason-blanchard">Jason Blanchard</a> - Host</li>
  <li><a href="https://anticasts.transistor.fm/people/cj-cox">CJ Cox</a> - Guest</li>
  <li><a href="https://anticasts.transistor.fm/people/patterson-cake">Patterson Cake</a> - Guest</li>
</ul><br></strong>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p><p><strong></strong></p><p><a href="https://share.transistor.fm/s/22771158/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Which AI workflows are already running in production SOCs right now, and which ones could you implement by next week?</p><p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits:</strong><br><a href="https://poweredbybhis.com">https://poweredbybhis.com</a> </p><p><strong>🛝 Webcast Slides:</strong><br><a href="https://www.antisyphontraining.com/wp-content/uploads/2026/01/Effective-AI-for-Practical-SecOps.pdf">https://www.antisyphontraining.com/wp-content/uploads/2026/01/Effective-AI-for-Practical-SecOps.pdf</a></p><p><strong>✏️ Learn from Hayden on Antisyphon Training:</strong><br><a href="https://www.antisyphontraining.com/search/Hayden">https://www.antisyphontraining.com/search/Hayden</a></p><p>Join Hayden Covington (Black Hills Infosec - SOC SecOps Lead) for a free one-hour training session to learn how to augment security analysts with AI through practical, tested workflows. <br>Cut through the noise of vendor demos, hype, and ChatGPT wrappers. </p><p>Hayden will teach you practical AI workflows that help analysts work faster and smarter without replacing their judgment. <br>Learn real techniques for detection engineering, case management, and QA, plus where AI truly helps (and where it doesn’t) so you can apply it right away.</p><p><strong>Chat with your fellow attendees in the BHIS Discord server:</strong><br><a href="https://discord.gg/bhis"><strong>https://discord.gg/bhis</strong></a><br>in the<strong> #🔴live-chat</strong> channel</p><p><strong>Chapters:<br><ul><li>(00:00) - INTRO – 2026-01-28 Effective AI Hayden</li>
<li>(02:29) - About Hayden</li>
<li>(03:33) - What This Session Is (and Isn't)</li>
<li>(04:26) - Let's Get Something Straight</li>
<li>(06:11) - What Augmentation Actually Looks Like</li>
<li>(12:03) - Before You Implement Anything...STOP</li>
<li>(13:14) - Consideration: Cost</li>
<li>(18:30) - Consideration: Policy &amp; Legal</li>
<li>(20:41) - Consideration: Data Sensitivity</li>
<li>(21:21) - Consideration: Team Buy-In</li>
<li>(23:35) - Consideration: PEBKAC</li>
<li>(27:55) - How We'll Break Down the Use Cases</li>
<li>(29:14) - Start This Week! – AI Projects: Curated Team Agents</li>
<li>(32:12) - Building a Good Agent</li>
<li>(33:18) - Detection Code Review Agent</li>
<li>(35:31) - Detection Code Review: Example Prompt (GH)</li>
<li>(37:01) - Why Markdown and Change Controlled Prompts Win</li>
<li>(38:38) - Start This Week! – SOC Analyst Agent</li>
<li>(40:20) - SOC Analyst Agent: Example Prompt</li>
<li>(41:56) - Other Agent Examples</li>
<li>(42:53) - Quick Wins: Raycast InfoSec Extensions</li>
<li>(44:44) - Raycast Example</li>
<li>(45:12) - Build This Month! – Case Management: Alert Titles &amp; Summaries</li>
<li>(46:23) - Case Management: Example</li>
<li>(47:10) - Case Management: Sample Implementation</li>
<li>(48:08) - Build This Month! – Quality Assurance: Automated Ticket Review</li>
<li>(48:44) - QA Workflow Options</li>
<li>(49:45) - QA: What It Catches</li>
<li>(50:15) - QA: Sample Prompt</li>
<li>(51:37) - Build This Month! – Detection Engineering: First-Draft Generation</li>
<li>(53:12) - Detection Engineering Workflow</li>
<li>(54:04) - Detection Engineering: Starter Approach</li>
<li>(54:45) - Detection Engineering: Sample Prompt</li>
<li>(56:58) - Where AI Often Fails</li>
<li>(59:27) - Key Takeaways</li>
<li>(01:00:31) - Resources &amp; Next Steps</li>
<li>(01:01:39) - QA Start</li>
<li>(01:04:31) - Patterson's Workshop</li>
</ul><br><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://anticasts.transistor.fm/people/hayden-covington">Hayden Covington</a> - Guest</li>
  <li><a href="https://anticasts.transistor.fm/people/meagan-bentley">Meagan Bentley</a> - Producer</li>
  <li><a href="https://anticasts.transistor.fm/people/jason-blanchard">Jason Blanchard</a> - Host</li>
  <li><a href="https://anticasts.transistor.fm/people/cj-cox">CJ Cox</a> - Guest</li>
  <li><a href="https://anticasts.transistor.fm/people/patterson-cake">Patterson Cake</a> - Guest</li>
</ul><br></strong>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p><p><strong></strong></p><p><a href="https://share.transistor.fm/s/22771158/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </content:encoded>
      <pubDate>Wed, 28 Jan 2026 16:43:42 -0500</pubDate>
      <author>Antisyphon Training</author>
      <enclosure url="https://media.transistor.fm/22771158/283066c8.mp3" length="81289696" type="audio/mpeg"/>
      <itunes:author>Antisyphon Training</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/0P11oyo99NzVPS0dkG8jU_unTt4wSXVX_k8QX8HuxXE/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xMmUy/ZjI2ZDQxNGNhYjJi/OWNkOTE0MDY4ZjQw/ZTk4My5wbmc.jpg"/>
      <itunes:duration>4759</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Which AI workflows are already running in production SOCs right now, and which ones could you implement by next week?</p><p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits:</strong><br><a href="https://poweredbybhis.com">https://poweredbybhis.com</a> </p><p><strong>🛝 Webcast Slides:</strong><br><a href="https://www.antisyphontraining.com/wp-content/uploads/2026/01/Effective-AI-for-Practical-SecOps.pdf">https://www.antisyphontraining.com/wp-content/uploads/2026/01/Effective-AI-for-Practical-SecOps.pdf</a></p><p><strong>✏️ Learn from Hayden on Antisyphon Training:</strong><br><a href="https://www.antisyphontraining.com/search/Hayden">https://www.antisyphontraining.com/search/Hayden</a></p><p>Join Hayden Covington (Black Hills Infosec - SOC SecOps Lead) for a free one-hour training session to learn how to augment security analysts with AI through practical, tested workflows. <br>Cut through the noise of vendor demos, hype, and ChatGPT wrappers. </p><p>Hayden will teach you practical AI workflows that help analysts work faster and smarter without replacing their judgment. <br>Learn real techniques for detection engineering, case management, and QA, plus where AI truly helps (and where it doesn’t) so you can apply it right away.</p><p><strong>Chat with your fellow attendees in the BHIS Discord server:</strong><br><a href="https://discord.gg/bhis"><strong>https://discord.gg/bhis</strong></a><br>in the<strong> #🔴live-chat</strong> channel</p><p><strong>Chapters:<br><ul><li>(00:00) - INTRO – 2026-01-28 Effective AI Hayden</li>
<li>(02:29) - About Hayden</li>
<li>(03:33) - What This Session Is (and Isn't)</li>
<li>(04:26) - Let's Get Something Straight</li>
<li>(06:11) - What Augmentation Actually Looks Like</li>
<li>(12:03) - Before You Implement Anything...STOP</li>
<li>(13:14) - Consideration: Cost</li>
<li>(18:30) - Consideration: Policy &amp; Legal</li>
<li>(20:41) - Consideration: Data Sensitivity</li>
<li>(21:21) - Consideration: Team Buy-In</li>
<li>(23:35) - Consideration: PEBKAC</li>
<li>(27:55) - How We'll Break Down the Use Cases</li>
<li>(29:14) - Start This Week! – AI Projects: Curated Team Agents</li>
<li>(32:12) - Building a Good Agent</li>
<li>(33:18) - Detection Code Review Agent</li>
<li>(35:31) - Detection Code Review: Example Prompt (GH)</li>
<li>(37:01) - Why Markdown and Change Controlled Prompts Win</li>
<li>(38:38) - Start This Week! – SOC Analyst Agent</li>
<li>(40:20) - SOC Analyst Agent: Example Prompt</li>
<li>(41:56) - Other Agent Examples</li>
<li>(42:53) - Quick Wins: Raycast InfoSec Extensions</li>
<li>(44:44) - Raycast Example</li>
<li>(45:12) - Build This Month! – Case Management: Alert Titles &amp; Summaries</li>
<li>(46:23) - Case Management: Example</li>
<li>(47:10) - Case Management: Sample Implementation</li>
<li>(48:08) - Build This Month! – Quality Assurance: Automated Ticket Review</li>
<li>(48:44) - QA Workflow Options</li>
<li>(49:45) - QA: What It Catches</li>
<li>(50:15) - QA: Sample Prompt</li>
<li>(51:37) - Build This Month! – Detection Engineering: First-Draft Generation</li>
<li>(53:12) - Detection Engineering Workflow</li>
<li>(54:04) - Detection Engineering: Starter Approach</li>
<li>(54:45) - Detection Engineering: Sample Prompt</li>
<li>(56:58) - Where AI Often Fails</li>
<li>(59:27) - Key Takeaways</li>
<li>(01:00:31) - Resources &amp; Next Steps</li>
<li>(01:01:39) - QA Start</li>
<li>(01:04:31) - Patterson's Workshop</li>
</ul><br><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://anticasts.transistor.fm/people/hayden-covington">Hayden Covington</a> - Guest</li>
  <li><a href="https://anticasts.transistor.fm/people/meagan-bentley">Meagan Bentley</a> - Producer</li>
  <li><a href="https://anticasts.transistor.fm/people/jason-blanchard">Jason Blanchard</a> - Host</li>
  <li><a href="https://anticasts.transistor.fm/people/cj-cox">CJ Cox</a> - Guest</li>
  <li><a href="https://anticasts.transistor.fm/people/patterson-cake">Patterson Cake</a> - Guest</li>
</ul><br></strong>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p><p><strong></strong></p><p><a href="https://share.transistor.fm/s/22771158/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Guest" href="https://www.blackhillsinfosec.com/team/hayden-covington/" img="https://img.transistorcdn.com/4MXYIOjRYbC9w-malPMnO73NucXs3dYNdA6aE1q6jO8/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8zMzFm/MmZkNjk0OTU0MDQw/ZDkxNzZmOGVkNDVl/MjMxYy5qcGc.jpg">Hayden Covington</podcast:person>
      <podcast:person role="Producer" href="https://anticasts.transistor.fm/people/meagan-bentley">Meagan Bentley</podcast:person>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/jason-blanchard/" img="https://img.transistorcdn.com/oVODZzuZpe4Vq2roY7S8ylFKDJ-z1ox7zXIQBkK72YI/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hNmM0/MzMxZmRkZDVjNjRh/ODgwNjczNzkyMDk0/MDYxNi5qcGc.jpg">Jason Blanchard</podcast:person>
      <podcast:person role="Guest" href="https://www.blackhillsinfosec.com/team/cj-cox/" img="https://img.transistorcdn.com/EN_ZKJTXbR0W0PY85rrx9qUuNT173PZSO2_kHIMk450/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iOWU1/NWI4NmNjODQ5NTRh/ZjY5MzBmY2E2ZWY0/MmMzMC5qcGc.jpg">CJ Cox</podcast:person>
      <podcast:person role="Guest" href="https://www.blackhillsinfosec.com/team/patterson-cake/" img="https://img.transistorcdn.com/WPvhS8-DCf34SlKVsfLlPE5z5OsPK74pLE3Us7BsC4M/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iMTNj/ZTkxNmFhZjFhMzlh/NjhkZmQwZDJmZjA3/NjFkYS5qcGc.jpg">Patterson Cake</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/22771158/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/22771158/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/22771158/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/22771158/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/22771158/transcription" type="text/html"/>
      <podcast:chapters url="https://share.transistor.fm/s/22771158/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>OSINT Like a Hacker with Mishaal Khan</title>
      <itunes:episode>3</itunes:episode>
      <podcast:episode>3</podcast:episode>
      <itunes:title>OSINT Like a Hacker with Mishaal Khan</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2b20cf9b-80a5-4dc9-beb5-bde9c98283f8</guid>
      <link>https://share.transistor.fm/s/cce8247f</link>
      <description>
        <![CDATA[<p>What if you could uncover secrets hidden in plain sight, weaving together digital breadcrumbs to reveal the untold stories of the online world? </p><p>Join Mishaal at WWHF Mile High '26 – In-Person or Virtual<br><a href="https://www.antisyphontraining.com/product/next-level-osint-with-mishaal-khan/">https://www.antisyphontraining.com/product/next-level-osint-with-mishaal-khan/</a><br>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – <br><a href="https://poweredbybhis.com">https://poweredbybhis.com</a><br> <br>Join instructor Mishaal Khan for a free one-hour hands-on training session, where you'll navigate real-world scenarios and build an investigation mind map, incorporating email addresses, phone numbers, Google Maps, APIs, and online form abuse. <br> <br>Learn to use unconventional hacker-style techniques to find information that could unlock a treasure trove and move the investigation forward. <br> <br>Mishaal will teach you new techniques and efficient ways of using common tools for unexpected results.</p><p><br><strong>Chat with your fellow attendees in the BHIS Discord server:</strong><br>https://discord.gg/bhis<br>in the #🔴live-chat channel</p><p><strong>Chapters:<br><ul><li>(00:00) - Intro- Finding John Cena</li>
<li>(09:35) - Data brokers + remote browsing to bypass geo/blocks</li>
<li>(28:16) - Midshow Q&amp;A</li>
<li>(28:43) - Do you need a PI license to do OSINT?</li>
<li>(30:41) - Is it harder/easier to find info outside the US (GDPR/Europe)?</li>
<li>(32:15) - AI/automation in your research—building that as you go, correct?</li>
<li>(33:30) - Best way to protect yourself against OSINT?</li>
<li>(52:02) - Post Show Q&amp;A</li>
<li>(52:29) - How is the Kaido method not unofficial pen testing?</li>
<li>(53:56) - How much deeper do you go in your course/class?</li>
<li>(55:38) - When you run out of tools, how do you find new alternatives?</li>
<li>(58:49) - Do you need to record findings in an admissible way—and what tool?</li>
<li>(01:03:05) - Best ways to contact Mishaal</li>
<li>(01:04:21) - Closing remarks + upcoming events</li>
</ul><br><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://anticasts.transistor.fm/people/meagan-bentley">Meagan Bentley</a> - Producer</li>
  <li><a href="https://anticasts.transistor.fm/people/mishaal-khan">Mishaal Khan</a> - Guest</li>
  <li><a href="https://anticasts.transistor.fm/people/zach-hill">Zach Hill</a> - Host</li>
</ul><br></strong>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p><p><strong></strong></p><p><a href="https://share.transistor.fm/s/cce8247f/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>What if you could uncover secrets hidden in plain sight, weaving together digital breadcrumbs to reveal the untold stories of the online world? </p><p>Join Mishaal at WWHF Mile High '26 – In-Person or Virtual<br><a href="https://www.antisyphontraining.com/product/next-level-osint-with-mishaal-khan/">https://www.antisyphontraining.com/product/next-level-osint-with-mishaal-khan/</a><br>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – <br><a href="https://poweredbybhis.com">https://poweredbybhis.com</a><br> <br>Join instructor Mishaal Khan for a free one-hour hands-on training session, where you'll navigate real-world scenarios and build an investigation mind map, incorporating email addresses, phone numbers, Google Maps, APIs, and online form abuse. <br> <br>Learn to use unconventional hacker-style techniques to find information that could unlock a treasure trove and move the investigation forward. <br> <br>Mishaal will teach you new techniques and efficient ways of using common tools for unexpected results.</p><p><br><strong>Chat with your fellow attendees in the BHIS Discord server:</strong><br>https://discord.gg/bhis<br>in the #🔴live-chat channel</p><p><strong>Chapters:<br><ul><li>(00:00) - Intro- Finding John Cena</li>
<li>(09:35) - Data brokers + remote browsing to bypass geo/blocks</li>
<li>(28:16) - Midshow Q&amp;A</li>
<li>(28:43) - Do you need a PI license to do OSINT?</li>
<li>(30:41) - Is it harder/easier to find info outside the US (GDPR/Europe)?</li>
<li>(32:15) - AI/automation in your research—building that as you go, correct?</li>
<li>(33:30) - Best way to protect yourself against OSINT?</li>
<li>(52:02) - Post Show Q&amp;A</li>
<li>(52:29) - How is the Kaido method not unofficial pen testing?</li>
<li>(53:56) - How much deeper do you go in your course/class?</li>
<li>(55:38) - When you run out of tools, how do you find new alternatives?</li>
<li>(58:49) - Do you need to record findings in an admissible way—and what tool?</li>
<li>(01:03:05) - Best ways to contact Mishaal</li>
<li>(01:04:21) - Closing remarks + upcoming events</li>
</ul><br><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://anticasts.transistor.fm/people/meagan-bentley">Meagan Bentley</a> - Producer</li>
  <li><a href="https://anticasts.transistor.fm/people/mishaal-khan">Mishaal Khan</a> - Guest</li>
  <li><a href="https://anticasts.transistor.fm/people/zach-hill">Zach Hill</a> - Host</li>
</ul><br></strong>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p><p><strong></strong></p><p><a href="https://share.transistor.fm/s/cce8247f/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </content:encoded>
      <pubDate>Thu, 22 Jan 2026 14:06:22 -0500</pubDate>
      <author>Antisyphon Training</author>
      <enclosure url="https://media.transistor.fm/cce8247f/8fec5f33.mp3" length="65532722" type="audio/mpeg"/>
      <itunes:author>Antisyphon Training</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/olqaiyb6VLs8qPiDxR_6MSy_EvC6Xy3lzIyY5l2HP4A/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82MmQ4/ZDg3MjhjZTJlOTM2/M2Q3ZWEyNjkxMmQy/NDNmOC5wbmc.jpg"/>
      <itunes:duration>3965</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>What if you could uncover secrets hidden in plain sight, weaving together digital breadcrumbs to reveal the untold stories of the online world? </p><p>Join Mishaal at WWHF Mile High '26 – In-Person or Virtual<br><a href="https://www.antisyphontraining.com/product/next-level-osint-with-mishaal-khan/">https://www.antisyphontraining.com/product/next-level-osint-with-mishaal-khan/</a><br>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – <br><a href="https://poweredbybhis.com">https://poweredbybhis.com</a><br> <br>Join instructor Mishaal Khan for a free one-hour hands-on training session, where you'll navigate real-world scenarios and build an investigation mind map, incorporating email addresses, phone numbers, Google Maps, APIs, and online form abuse. <br> <br>Learn to use unconventional hacker-style techniques to find information that could unlock a treasure trove and move the investigation forward. <br> <br>Mishaal will teach you new techniques and efficient ways of using common tools for unexpected results.</p><p><br><strong>Chat with your fellow attendees in the BHIS Discord server:</strong><br>https://discord.gg/bhis<br>in the #🔴live-chat channel</p><p><strong>Chapters:<br><ul><li>(00:00) - Intro- Finding John Cena</li>
<li>(09:35) - Data brokers + remote browsing to bypass geo/blocks</li>
<li>(28:16) - Midshow Q&amp;A</li>
<li>(28:43) - Do you need a PI license to do OSINT?</li>
<li>(30:41) - Is it harder/easier to find info outside the US (GDPR/Europe)?</li>
<li>(32:15) - AI/automation in your research—building that as you go, correct?</li>
<li>(33:30) - Best way to protect yourself against OSINT?</li>
<li>(52:02) - Post Show Q&amp;A</li>
<li>(52:29) - How is the Kaido method not unofficial pen testing?</li>
<li>(53:56) - How much deeper do you go in your course/class?</li>
<li>(55:38) - When you run out of tools, how do you find new alternatives?</li>
<li>(58:49) - Do you need to record findings in an admissible way—and what tool?</li>
<li>(01:03:05) - Best ways to contact Mishaal</li>
<li>(01:04:21) - Closing remarks + upcoming events</li>
</ul><br><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://anticasts.transistor.fm/people/meagan-bentley">Meagan Bentley</a> - Producer</li>
  <li><a href="https://anticasts.transistor.fm/people/mishaal-khan">Mishaal Khan</a> - Guest</li>
  <li><a href="https://anticasts.transistor.fm/people/zach-hill">Zach Hill</a> - Host</li>
</ul><br></strong>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p><p><strong></strong></p><p><a href="https://share.transistor.fm/s/cce8247f/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Producer" href="https://anticasts.transistor.fm/people/meagan-bentley">Meagan Bentley</podcast:person>
      <podcast:person role="Guest" href="https://www.antisyphontraining.com/instructor/mishaal-khan/" img="https://img.transistorcdn.com/hfNWOge4_C0puaFimp2G2zpxVju4tVzPmM40umlFqz4/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85NjFh/MGQxMjE3ODBkOTJk/ZTA1YTE0MTg4ODhl/NmVmOC5wbmc.jpg">Mishaal Khan</podcast:person>
      <podcast:person role="Host" href="https://www.antisyphontraining.com/instructor/zach-hill-instructor/" img="https://img.transistorcdn.com/GrK_hNtXoU0p-hSFnD8hgtw3mArlg3R_Cd8iEhhnEJw/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83NDk0/OTI5NjZiYWNiZDA3/ZWEwZGU4ZDUxNzQy/MTJmYy5qcGc.jpg">Zach Hill</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/cce8247f/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/cce8247f/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/cce8247f/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/cce8247f/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/cce8247f/transcription" type="text/html"/>
      <podcast:chapters url="https://share.transistor.fm/s/cce8247f/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Threat Hunting Malware Communication over DNS</title>
      <itunes:episode>2</itunes:episode>
      <podcast:episode>2</podcast:episode>
      <itunes:title>Threat Hunting Malware Communication over DNS</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">42c18523-6b2e-42bb-aea4-bb2fbf4a4c64</guid>
      <link>https://share.transistor.fm/s/8d22a8e0</link>
      <description>
        <![CDATA[<p>Are attackers hiding in your DNS traffic right now?</p><p>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </p><p><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p>Join instructor Faan Rossouw for a free one-hour training on hunting malware that uses DNS as a covert communication channel.</p><p>C2 frameworks, RATs, and backdoors frequently exploit DNS to stay hidden - sometimes for months. High-profile attacks like SolarWinds' Sunburst demonstrate just how devastating undetected DNS exfiltration can be.</p><p>This Antisyphon Anti-Cast focuses on behavior-based threat hunting techniques that go beyond signatures to uncover suspicious DNS activity attackers think they've hidden.</p><p>You'll learn how to:<br>* Recognize network artifacts that DNS tunneling produces<br>* Identify anomalies in DNS record types that signal malicious use<br>* Leverage open-source tools like Zeek, RITA, and Sysmon to detect malware abusing DNS<br>* Build detection strategies that make it very hard for DNS-based threats to remain hidden</p><p>If you're ready to stop trusting DNS and start verifying it, this session will give you the practical skills to hunt what's lurking in your network.</p><p><strong>Chapters:<br><ul><li>(00:00) - Intro - Threat Hunting Malware Communication over DNS</li>
<li>(00:53) - Introducing Faan</li>
<li>(02:28) - Threat Hunting C2 Over DNS</li>
<li>(04:00) - Threat Hunting - What is it and why is it awesome?</li>
<li>(05:42) - Assumed Compromise</li>
<li>(06:55) - David J. Bianco – Pyramid of Pain Guy</li>
<li>(13:28) - C2 Over DNS</li>
<li>(28:03) - TXT Record Abuse</li>
<li>(32:46) - Null Record</li>
<li>(35:07) - CNAME, MX, SRV… Oh my</li>
<li>(38:26) - DNS Sandwhich</li>
<li>(42:48) - ID Field Missuse</li>
<li>(48:58) - EDNS0</li>
<li>(52:33) - Encrypted DNS</li>
<li>(55:15) - Main Takeaway</li>
<li>(56:14) - The Workshop: Build a Reflective Shellcode Loader C2 in Golang</li>
<li>(57:51) - Q&amp;A Start</li>
<li>(01:00:15) - DNS and Splunk?</li>
<li>(01:01:48) - Suggestions for Detecting DGA?</li>
<li>(01:03:25) - Offensive Security Tooling from a Threat Hunter Perspective</li>
<li>(01:07:27) - Restrict outbound DNS to protect against C2?</li>
<li>(01:09:06) - Communicating the value of Threat Hunting to Higher Ups.</li>
<li>(01:13:49) - Closing Remarks</li>
</ul><br><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://anticasts.transistor.fm/people/faan-rossouw">Faan Rossouw</a> - Guest</li>
  <li><a href="https://anticasts.transistor.fm/people/zach-hill">Zach Hill</a> - Host</li>
  <li><a href="https://anticasts.transistor.fm/people/meagan-bentley">Meagan Bentley</a> - Producer</li>
</ul><br></strong>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p><p><strong></strong></p><p><a href="https://share.transistor.fm/s/8d22a8e0/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Are attackers hiding in your DNS traffic right now?</p><p>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </p><p><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p>Join instructor Faan Rossouw for a free one-hour training on hunting malware that uses DNS as a covert communication channel.</p><p>C2 frameworks, RATs, and backdoors frequently exploit DNS to stay hidden - sometimes for months. High-profile attacks like SolarWinds' Sunburst demonstrate just how devastating undetected DNS exfiltration can be.</p><p>This Antisyphon Anti-Cast focuses on behavior-based threat hunting techniques that go beyond signatures to uncover suspicious DNS activity attackers think they've hidden.</p><p>You'll learn how to:<br>* Recognize network artifacts that DNS tunneling produces<br>* Identify anomalies in DNS record types that signal malicious use<br>* Leverage open-source tools like Zeek, RITA, and Sysmon to detect malware abusing DNS<br>* Build detection strategies that make it very hard for DNS-based threats to remain hidden</p><p>If you're ready to stop trusting DNS and start verifying it, this session will give you the practical skills to hunt what's lurking in your network.</p><p><strong>Chapters:<br><ul><li>(00:00) - Intro - Threat Hunting Malware Communication over DNS</li>
<li>(00:53) - Introducing Faan</li>
<li>(02:28) - Threat Hunting C2 Over DNS</li>
<li>(04:00) - Threat Hunting - What is it and why is it awesome?</li>
<li>(05:42) - Assumed Compromise</li>
<li>(06:55) - David J. Bianco – Pyramid of Pain Guy</li>
<li>(13:28) - C2 Over DNS</li>
<li>(28:03) - TXT Record Abuse</li>
<li>(32:46) - Null Record</li>
<li>(35:07) - CNAME, MX, SRV… Oh my</li>
<li>(38:26) - DNS Sandwhich</li>
<li>(42:48) - ID Field Missuse</li>
<li>(48:58) - EDNS0</li>
<li>(52:33) - Encrypted DNS</li>
<li>(55:15) - Main Takeaway</li>
<li>(56:14) - The Workshop: Build a Reflective Shellcode Loader C2 in Golang</li>
<li>(57:51) - Q&amp;A Start</li>
<li>(01:00:15) - DNS and Splunk?</li>
<li>(01:01:48) - Suggestions for Detecting DGA?</li>
<li>(01:03:25) - Offensive Security Tooling from a Threat Hunter Perspective</li>
<li>(01:07:27) - Restrict outbound DNS to protect against C2?</li>
<li>(01:09:06) - Communicating the value of Threat Hunting to Higher Ups.</li>
<li>(01:13:49) - Closing Remarks</li>
</ul><br><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://anticasts.transistor.fm/people/faan-rossouw">Faan Rossouw</a> - Guest</li>
  <li><a href="https://anticasts.transistor.fm/people/zach-hill">Zach Hill</a> - Host</li>
  <li><a href="https://anticasts.transistor.fm/people/meagan-bentley">Meagan Bentley</a> - Producer</li>
</ul><br></strong>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p><p><strong></strong></p><p><a href="https://share.transistor.fm/s/8d22a8e0/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </content:encoded>
      <pubDate>Sat, 17 Jan 2026 08:31:23 -0500</pubDate>
      <author>Antisyphon Training</author>
      <enclosure url="https://media.transistor.fm/8d22a8e0/5b0756cf.mp3" length="85916192" type="audio/mpeg"/>
      <itunes:author>Antisyphon Training</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/HNdcQq1dM-HTSO4eoKW2q1WNcfT7EfZDlTjzcHOQsTY/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83NjU5/MTlmNjhjZGVjZDc2/YmVhNTM4MGUzYzJj/MzQ4Yy5wbmc.jpg"/>
      <itunes:duration>5180</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Are attackers hiding in your DNS traffic right now?</p><p>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </p><p><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p>Join instructor Faan Rossouw for a free one-hour training on hunting malware that uses DNS as a covert communication channel.</p><p>C2 frameworks, RATs, and backdoors frequently exploit DNS to stay hidden - sometimes for months. High-profile attacks like SolarWinds' Sunburst demonstrate just how devastating undetected DNS exfiltration can be.</p><p>This Antisyphon Anti-Cast focuses on behavior-based threat hunting techniques that go beyond signatures to uncover suspicious DNS activity attackers think they've hidden.</p><p>You'll learn how to:<br>* Recognize network artifacts that DNS tunneling produces<br>* Identify anomalies in DNS record types that signal malicious use<br>* Leverage open-source tools like Zeek, RITA, and Sysmon to detect malware abusing DNS<br>* Build detection strategies that make it very hard for DNS-based threats to remain hidden</p><p>If you're ready to stop trusting DNS and start verifying it, this session will give you the practical skills to hunt what's lurking in your network.</p><p><strong>Chapters:<br><ul><li>(00:00) - Intro - Threat Hunting Malware Communication over DNS</li>
<li>(00:53) - Introducing Faan</li>
<li>(02:28) - Threat Hunting C2 Over DNS</li>
<li>(04:00) - Threat Hunting - What is it and why is it awesome?</li>
<li>(05:42) - Assumed Compromise</li>
<li>(06:55) - David J. Bianco – Pyramid of Pain Guy</li>
<li>(13:28) - C2 Over DNS</li>
<li>(28:03) - TXT Record Abuse</li>
<li>(32:46) - Null Record</li>
<li>(35:07) - CNAME, MX, SRV… Oh my</li>
<li>(38:26) - DNS Sandwhich</li>
<li>(42:48) - ID Field Missuse</li>
<li>(48:58) - EDNS0</li>
<li>(52:33) - Encrypted DNS</li>
<li>(55:15) - Main Takeaway</li>
<li>(56:14) - The Workshop: Build a Reflective Shellcode Loader C2 in Golang</li>
<li>(57:51) - Q&amp;A Start</li>
<li>(01:00:15) - DNS and Splunk?</li>
<li>(01:01:48) - Suggestions for Detecting DGA?</li>
<li>(01:03:25) - Offensive Security Tooling from a Threat Hunter Perspective</li>
<li>(01:07:27) - Restrict outbound DNS to protect against C2?</li>
<li>(01:09:06) - Communicating the value of Threat Hunting to Higher Ups.</li>
<li>(01:13:49) - Closing Remarks</li>
</ul><br><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://anticasts.transistor.fm/people/faan-rossouw">Faan Rossouw</a> - Guest</li>
  <li><a href="https://anticasts.transistor.fm/people/zach-hill">Zach Hill</a> - Host</li>
  <li><a href="https://anticasts.transistor.fm/people/meagan-bentley">Meagan Bentley</a> - Producer</li>
</ul><br></strong>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p><p><strong></strong></p><p><a href="https://share.transistor.fm/s/8d22a8e0/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Guest" href="https://www.antisyphontraining.com/instructor/faan-ross/" img="https://img.transistorcdn.com/4aPkVqkG1KVZKV854zcRoTcZFT6brMwKf1HmsjCXwag/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iYTI2/YWE0ZDA4NTliYjFm/NGU2MzZjNjAxNDE3/M2RmMy5wbmc.jpg">Faan Rossouw</podcast:person>
      <podcast:person role="Host" href="https://www.antisyphontraining.com/instructor/zach-hill-instructor/" img="https://img.transistorcdn.com/GrK_hNtXoU0p-hSFnD8hgtw3mArlg3R_Cd8iEhhnEJw/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83NDk0/OTI5NjZiYWNiZDA3/ZWEwZGU4ZDUxNzQy/MTJmYy5qcGc.jpg">Zach Hill</podcast:person>
      <podcast:person role="Producer" href="https://anticasts.transistor.fm/people/meagan-bentley">Meagan Bentley</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/8d22a8e0/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/8d22a8e0/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/8d22a8e0/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/8d22a8e0/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/8d22a8e0/transcription" type="text/html"/>
      <podcast:chapters url="https://share.transistor.fm/s/8d22a8e0/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Intro to Using Defense Hacking Tools with Jordan Drysdale and Kent Ickler</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Intro to Using Defense Hacking Tools with Jordan Drysdale and Kent Ickler</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f3fb8484-5622-4bc3-a8e9-840d654a19d9</guid>
      <link>https://share.transistor.fm/s/82cd7267</link>
      <description>
        <![CDATA[<p>How do you use hacking tools? </p><p>🛝 Webcast Slides<br><a href="https://www.antisyphontraining.com/wp-content/uploads/2026/01/IntroToHackingTools-kent-and-jordan.pdf">https://www.antisyphontraining.com/wp-content/uploads/2026/01/IntroToHackingTools-kent-and-jordan.pdf</a></p><p>🎓Antisyphon Training with Kent &amp; Jordan at WWHF Mile High 2026:<br><a href="https://www.antisyphontraining.com/product/active-directory-security-and-hardening-with-jordan-drysdale-and-kent-ickler/">https://www.antisyphontraining.com/product/active-directory-security-and-hardening-with-jordan-drysdale-and-kent-ickler/</a></p><p>Join instructors Jordan Drysdale and Kent Ickler (Black Hills Information Security – Testers) for a free one-hour training session featuring a live demonstration of hacking tools in a speed run against a messy Active Directory domain.</p><p>You’ll get a rapid-fire introduction to Jordan and Kent’s standard hacking techniques and learn strategies based on their popular Lab Building 101 framework.</p><p>Kent and Jordan will demystify how these tools work so you can feel confident using them yourself.</p><p><br><strong>Chapters:<br><ul><li>(00:00) - Intro - Intro to Using Defense Hacking Tools</li>
<li>(01:48) - Executive Problem Statement</li>
<li>(03:28) - First and Foremost</li>
<li>(10:33) - Recon &amp; OSINT Tooling</li>
<li>(19:09) - Scan &amp; Enumerate Tooling</li>
<li>(24:37) - Vulnerability Scanning</li>
<li>(27:17) - Vulnerability Exploitation</li>
<li>(31:47) - Web Applications</li>
<li>(36:07) - Local System Tooling</li>
<li>(38:03) - Password Spraying/Cred Abuse</li>
<li>(41:39) - Active Directory</li>
<li>(49:35) - Proxy Chains / SSH Tunnels</li>
<li>(50:18) - SMB File Shares</li>
<li>(51:35) - Kerberos Interaction</li>
<li>(52:39) - Impacket Tools</li>
<li>(54:04) - Pre-Windows 2000</li>
<li>(55:22) - Credential Relay (and LLMNR)</li>
<li>(56:44) - ADCS Investigation &amp; Abuse</li>
<li>(57:17) - Browser Hijacks</li>
<li>(58:14) - We Have a Class - Active Directory Security and Hardening</li>
<li>(58:53) - Q&amp;A Start</li>
<li>(01:00:13) - How Do you Build These Skills?</li>
<li>(01:02:08) - When Did You Start Feeling Comfortable with Your Skillset?</li>
<li>(01:06:23) - Getting a Company to Approve Running These Tools?</li>
<li>(01:08:50) - HIPPA Approved Tools?</li>
<li>(01:11:06) - Training for an Organization?</li>
<li>(01:12:23) - Finding Entry Level Jobs</li>
<li>(01:14:58) - Closing Remarks</li>
</ul><br><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://anticasts.transistor.fm/people/zach-hill">Zach Hill</a> - Host</li>
  <li><a href="https://anticasts.transistor.fm/people/jordan-drysdale">Jordan Drysdale</a> - Guest</li>
  <li><a href="https://anticasts.transistor.fm/people/meagan-bentley">Meagan Bentley</a> - Producer</li>
  <li><a href="https://anticasts.transistor.fm/people/kent-ickler">Kent Ickler</a> - Guest</li>
</ul><br></strong>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p><p><br><strong><a href="https://www.youtube.com/watch?v=WWz857uhCrE" title="Click here to watch a video of this episode.">Click here to watch a video of this episode.</a><br>
<br><a href="https://share.transistor.fm/s/82cd7267/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</strong></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>How do you use hacking tools? </p><p>🛝 Webcast Slides<br><a href="https://www.antisyphontraining.com/wp-content/uploads/2026/01/IntroToHackingTools-kent-and-jordan.pdf">https://www.antisyphontraining.com/wp-content/uploads/2026/01/IntroToHackingTools-kent-and-jordan.pdf</a></p><p>🎓Antisyphon Training with Kent &amp; Jordan at WWHF Mile High 2026:<br><a href="https://www.antisyphontraining.com/product/active-directory-security-and-hardening-with-jordan-drysdale-and-kent-ickler/">https://www.antisyphontraining.com/product/active-directory-security-and-hardening-with-jordan-drysdale-and-kent-ickler/</a></p><p>Join instructors Jordan Drysdale and Kent Ickler (Black Hills Information Security – Testers) for a free one-hour training session featuring a live demonstration of hacking tools in a speed run against a messy Active Directory domain.</p><p>You’ll get a rapid-fire introduction to Jordan and Kent’s standard hacking techniques and learn strategies based on their popular Lab Building 101 framework.</p><p>Kent and Jordan will demystify how these tools work so you can feel confident using them yourself.</p><p><br><strong>Chapters:<br><ul><li>(00:00) - Intro - Intro to Using Defense Hacking Tools</li>
<li>(01:48) - Executive Problem Statement</li>
<li>(03:28) - First and Foremost</li>
<li>(10:33) - Recon &amp; OSINT Tooling</li>
<li>(19:09) - Scan &amp; Enumerate Tooling</li>
<li>(24:37) - Vulnerability Scanning</li>
<li>(27:17) - Vulnerability Exploitation</li>
<li>(31:47) - Web Applications</li>
<li>(36:07) - Local System Tooling</li>
<li>(38:03) - Password Spraying/Cred Abuse</li>
<li>(41:39) - Active Directory</li>
<li>(49:35) - Proxy Chains / SSH Tunnels</li>
<li>(50:18) - SMB File Shares</li>
<li>(51:35) - Kerberos Interaction</li>
<li>(52:39) - Impacket Tools</li>
<li>(54:04) - Pre-Windows 2000</li>
<li>(55:22) - Credential Relay (and LLMNR)</li>
<li>(56:44) - ADCS Investigation &amp; Abuse</li>
<li>(57:17) - Browser Hijacks</li>
<li>(58:14) - We Have a Class - Active Directory Security and Hardening</li>
<li>(58:53) - Q&amp;A Start</li>
<li>(01:00:13) - How Do you Build These Skills?</li>
<li>(01:02:08) - When Did You Start Feeling Comfortable with Your Skillset?</li>
<li>(01:06:23) - Getting a Company to Approve Running These Tools?</li>
<li>(01:08:50) - HIPPA Approved Tools?</li>
<li>(01:11:06) - Training for an Organization?</li>
<li>(01:12:23) - Finding Entry Level Jobs</li>
<li>(01:14:58) - Closing Remarks</li>
</ul><br><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://anticasts.transistor.fm/people/zach-hill">Zach Hill</a> - Host</li>
  <li><a href="https://anticasts.transistor.fm/people/jordan-drysdale">Jordan Drysdale</a> - Guest</li>
  <li><a href="https://anticasts.transistor.fm/people/meagan-bentley">Meagan Bentley</a> - Producer</li>
  <li><a href="https://anticasts.transistor.fm/people/kent-ickler">Kent Ickler</a> - Guest</li>
</ul><br></strong>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p><p><br><strong><a href="https://www.youtube.com/watch?v=WWz857uhCrE" title="Click here to watch a video of this episode.">Click here to watch a video of this episode.</a><br>
<br><a href="https://share.transistor.fm/s/82cd7267/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</strong></p>]]>
      </content:encoded>
      <pubDate>Fri, 09 Jan 2026 16:03:00 -0500</pubDate>
      <author>Antisyphon Training</author>
      <enclosure url="https://media.transistor.fm/82cd7267/76f2bd9f.mp3" length="78508894" type="audio/mpeg"/>
      <itunes:author>Antisyphon Training</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/wv2nqbZBqrSB8T_T55p2Ol5vtnKih_qRiuyyUfGViNE/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hNzZk/NjE4OWMzN2Y2MzNj/MjA3OTBkMjliNDAx/MWQ2NC5wbmc.jpg"/>
      <itunes:duration>4626</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>How do you use hacking tools? </p><p>🛝 Webcast Slides<br><a href="https://www.antisyphontraining.com/wp-content/uploads/2026/01/IntroToHackingTools-kent-and-jordan.pdf">https://www.antisyphontraining.com/wp-content/uploads/2026/01/IntroToHackingTools-kent-and-jordan.pdf</a></p><p>🎓Antisyphon Training with Kent &amp; Jordan at WWHF Mile High 2026:<br><a href="https://www.antisyphontraining.com/product/active-directory-security-and-hardening-with-jordan-drysdale-and-kent-ickler/">https://www.antisyphontraining.com/product/active-directory-security-and-hardening-with-jordan-drysdale-and-kent-ickler/</a></p><p>Join instructors Jordan Drysdale and Kent Ickler (Black Hills Information Security – Testers) for a free one-hour training session featuring a live demonstration of hacking tools in a speed run against a messy Active Directory domain.</p><p>You’ll get a rapid-fire introduction to Jordan and Kent’s standard hacking techniques and learn strategies based on their popular Lab Building 101 framework.</p><p>Kent and Jordan will demystify how these tools work so you can feel confident using them yourself.</p><p><br><strong>Chapters:<br><ul><li>(00:00) - Intro - Intro to Using Defense Hacking Tools</li>
<li>(01:48) - Executive Problem Statement</li>
<li>(03:28) - First and Foremost</li>
<li>(10:33) - Recon &amp; OSINT Tooling</li>
<li>(19:09) - Scan &amp; Enumerate Tooling</li>
<li>(24:37) - Vulnerability Scanning</li>
<li>(27:17) - Vulnerability Exploitation</li>
<li>(31:47) - Web Applications</li>
<li>(36:07) - Local System Tooling</li>
<li>(38:03) - Password Spraying/Cred Abuse</li>
<li>(41:39) - Active Directory</li>
<li>(49:35) - Proxy Chains / SSH Tunnels</li>
<li>(50:18) - SMB File Shares</li>
<li>(51:35) - Kerberos Interaction</li>
<li>(52:39) - Impacket Tools</li>
<li>(54:04) - Pre-Windows 2000</li>
<li>(55:22) - Credential Relay (and LLMNR)</li>
<li>(56:44) - ADCS Investigation &amp; Abuse</li>
<li>(57:17) - Browser Hijacks</li>
<li>(58:14) - We Have a Class - Active Directory Security and Hardening</li>
<li>(58:53) - Q&amp;A Start</li>
<li>(01:00:13) - How Do you Build These Skills?</li>
<li>(01:02:08) - When Did You Start Feeling Comfortable with Your Skillset?</li>
<li>(01:06:23) - Getting a Company to Approve Running These Tools?</li>
<li>(01:08:50) - HIPPA Approved Tools?</li>
<li>(01:11:06) - Training for an Organization?</li>
<li>(01:12:23) - Finding Entry Level Jobs</li>
<li>(01:14:58) - Closing Remarks</li>
</ul><br><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://anticasts.transistor.fm/people/zach-hill">Zach Hill</a> - Host</li>
  <li><a href="https://anticasts.transistor.fm/people/jordan-drysdale">Jordan Drysdale</a> - Guest</li>
  <li><a href="https://anticasts.transistor.fm/people/meagan-bentley">Meagan Bentley</a> - Producer</li>
  <li><a href="https://anticasts.transistor.fm/people/kent-ickler">Kent Ickler</a> - Guest</li>
</ul><br></strong>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p><p><br><strong><a href="https://www.youtube.com/watch?v=WWz857uhCrE" title="Click here to watch a video of this episode.">Click here to watch a video of this episode.</a><br>
<br><a href="https://share.transistor.fm/s/82cd7267/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</strong></p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.antisyphontraining.com/instructor/zach-hill-instructor/" img="https://img.transistorcdn.com/GrK_hNtXoU0p-hSFnD8hgtw3mArlg3R_Cd8iEhhnEJw/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS83NDk0/OTI5NjZiYWNiZDA3/ZWEwZGU4ZDUxNzQy/MTJmYy5qcGc.jpg">Zach Hill</podcast:person>
      <podcast:person role="Guest" href="https://www.antisyphontraining.com/instructor/jordandrysdale/" img="https://img.transistorcdn.com/PPURTszXJvKEjdOJc5QZLkj0J4b7knzSuSZLSV6QUD0/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kOGMz/ZDE0ZWI3ZTUzODVj/MGY2ODczODZiZjE0/NmY1NS5qcGc.jpg">Jordan Drysdale</podcast:person>
      <podcast:person role="Producer" href="https://anticasts.transistor.fm/people/meagan-bentley">Meagan Bentley</podcast:person>
      <podcast:person role="Guest" href="https://www.antisyphontraining.com/instructor/kentickler/" img="https://img.transistorcdn.com/KlcCZQR0cWiGg9b2C7uewPw6fXKu_wFMHxp3NUP0OOY/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84Y2Rm/ZDc3MTc1ZWI0N2Q4/MDFkMjM1MjFhZDA0/ZTllZi5qcGc.jpg">Kent Ickler</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/82cd7267/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/82cd7267/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/82cd7267/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/82cd7267/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/82cd7267/transcription" type="text/html"/>
      <podcast:chapters url="https://share.transistor.fm/s/82cd7267/chapters.json" type="application/json+chapters"/>
    </item>
  </channel>
</rss>
