<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet href="/stylesheet.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link rel="self" type="application/rss+xml" href="https://feeds.transistor.fm/you-gotta-hack-that" title="MP3 Audio"/>
    <atom:link rel="hub" href="https://pubsubhubbub.appspot.com/"/>
    <podcast:podping usesPodping="true"/>
    <title>You Gotta Hack That</title>
    <generator>Transistor (https://transistor.fm)</generator>
    <itunes:new-feed-url>https://feeds.transistor.fm/you-gotta-hack-that</itunes:new-feed-url>
    <description>Felix explores Internet of Things (IoT) and Operational Technology cyber security. Perfect for project managers, developers, and those learning about penetration testing in this niche area.

Email Felix using helpme@yg.ht
Get more information at the website: yougottahackthat.com
Find You Gotta Hack That on LinkedIn and X @gotta_hack</description>
    <copyright>© You Gotta Hack That</copyright>
    <podcast:guid>cf43784f-fba1-53f9-ad53-a3d8afd66de5</podcast:guid>
    <podcast:locked>yes</podcast:locked>
    <podcast:trailer pubdate="Fri, 20 Jan 2023 14:30:00 +0000" url="https://media.transistor.fm/d1554590/68f83fe1.mp3" length="679183" type="audio/mpeg">Welcome to You Gotta Hack That</podcast:trailer>
    <language>en</language>
    <pubDate>Thu, 14 May 2026 07:00:06 +0100</pubDate>
    <lastBuildDate>Thu, 14 May 2026 07:01:56 +0100</lastBuildDate>
    <link>https://yougottahackthat.com/</link>
    <image>
      <url>https://img.transistorcdn.com/3ksqdH-tjuatTy-DvqwaseZb5sjUBzJgtd-tbTWLVoc/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85ZWIx/M2EzOWZhMjY4N2U1/ZWI2YzU1OTJlN2Rj/MGRjZi5wbmc.jpg</url>
      <title>You Gotta Hack That</title>
      <link>https://yougottahackthat.com/</link>
    </image>
    <itunes:category text="Technology"/>
    <itunes:category text="Education">
      <itunes:category text="Courses"/>
    </itunes:category>
    <itunes:type>episodic</itunes:type>
    <itunes:author>You Gotta Hack That</itunes:author>
    <itunes:image href="https://img.transistorcdn.com/3ksqdH-tjuatTy-DvqwaseZb5sjUBzJgtd-tbTWLVoc/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85ZWIx/M2EzOWZhMjY4N2U1/ZWI2YzU1OTJlN2Rj/MGRjZi5wbmc.jpg"/>
    <itunes:summary>Felix explores Internet of Things (IoT) and Operational Technology cyber security. Perfect for project managers, developers, and those learning about penetration testing in this niche area.

Email Felix using helpme@yg.ht
Get more information at the website: yougottahackthat.com
Find You Gotta Hack That on LinkedIn and X @gotta_hack</itunes:summary>
    <itunes:subtitle>Felix explores Internet of Things (IoT) and Operational Technology cyber security.</itunes:subtitle>
    <itunes:keywords>Internet of things, IoT, Operational Technology, OT, cyber security, hacking, testing, penetration testing, embedded security, industrial control systems, cyber security, cyber assurance, operational technology, OT security</itunes:keywords>
    <itunes:owner>
      <itunes:name>You Gotta Hack That</itunes:name>
    </itunes:owner>
    <itunes:complete>No</itunes:complete>
    <itunes:explicit>No</itunes:explicit>
    <item>
      <title>Nerds vs suits</title>
      <itunes:episode>30</itunes:episode>
      <podcast:episode>30</podcast:episode>
      <itunes:title>Nerds vs suits</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">01f2bd77-a7b4-4539-b85d-6ee23e0adfe7</guid>
      <link>https://share.transistor.fm/s/d1ab487d</link>
      <description>
        <![CDATA[<p>In this episode of You Gotta Hack That, Felix sits down with Alex Ward to unpack the real gap in OT security, nerds versus suits. They dig into why “good enough” thinking persists, how risk gets lost in translation between engineers and the board, and why signing off risk can focus minds fast. They also get into the uncomfortable bits, safety, insider threats, and why recovery and business continuity often matter as much as prevention in industrial environments. Expect blunt talk, practical framing, and a few war stories from the OT frontline.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of You Gotta Hack That, Felix sits down with Alex Ward to unpack the real gap in OT security, nerds versus suits. They dig into why “good enough” thinking persists, how risk gets lost in translation between engineers and the board, and why signing off risk can focus minds fast. They also get into the uncomfortable bits, safety, insider threats, and why recovery and business continuity often matter as much as prevention in industrial environments. Expect blunt talk, practical framing, and a few war stories from the OT frontline.</p>]]>
      </content:encoded>
      <pubDate>Wed, 25 Feb 2026 14:09:04 +0000</pubDate>
      <author>You Gotta Hack That</author>
      <enclosure url="https://media.transistor.fm/d1ab487d/c9d6245c.mp3" length="20762233" type="audio/mpeg"/>
      <itunes:author>You Gotta Hack That</itunes:author>
      <itunes:duration>1296</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of You Gotta Hack That, Felix sits down with Alex Ward to unpack the real gap in OT security, nerds versus suits. They dig into why “good enough” thinking persists, how risk gets lost in translation between engineers and the board, and why signing off risk can focus minds fast. They also get into the uncomfortable bits, safety, insider threats, and why recovery and business continuity often matter as much as prevention in industrial environments. Expect blunt talk, practical framing, and a few war stories from the OT frontline.</p>]]>
      </itunes:summary>
      <itunes:keywords>Internet of things, IoT, Operational Technology, OT, cyber security, hacking, testing, penetration testing, embedded security, industrial control systems, cyber security, cyber assurance, operational technology, OT security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/d1ab487d/transcript.txt" type="text/plain"/>
      <podcast:socialInteract protocol="atproto" uri="at://did:plc:xz5znvyfngp6ndbmlw4hiuil/app.bsky.feed.post/3mfouai4qv327"/>
    </item>
    <item>
      <title>Mag stripes died...  Is contactless dangerous again?</title>
      <itunes:episode>29</itunes:episode>
      <podcast:episode>29</podcast:episode>
      <itunes:title>Mag stripes died...  Is contactless dangerous again?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">cdf16081-0236-4593-9134-dbb55bfeb65d</guid>
      <link>https://share.transistor.fm/s/de13e0af</link>
      <description>
        <![CDATA[<p>From carbon-copy receipts and zip-zap machines to mag stripes, chip and PIN, contactless and mobile wallets, payment tech keeps evolving, and attackers evolve right alongside it. Felix sits down with Gareth, a payments industry veteran of 30 years, to unpack the real hardware attack surface: skimmers in stripe readers, ATM overlays, contactless relay tricks, and why static QR codes are basically begging to be abused. They also dig into why raising contactless limits changes theft economics, how phone theft turns into credential theft, and why the EU Cyber Resilience Act means you need to think about hardware security now.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>From carbon-copy receipts and zip-zap machines to mag stripes, chip and PIN, contactless and mobile wallets, payment tech keeps evolving, and attackers evolve right alongside it. Felix sits down with Gareth, a payments industry veteran of 30 years, to unpack the real hardware attack surface: skimmers in stripe readers, ATM overlays, contactless relay tricks, and why static QR codes are basically begging to be abused. They also dig into why raising contactless limits changes theft economics, how phone theft turns into credential theft, and why the EU Cyber Resilience Act means you need to think about hardware security now.</p>]]>
      </content:encoded>
      <pubDate>Wed, 18 Feb 2026 10:10:11 +0000</pubDate>
      <author>You Gotta Hack That</author>
      <enclosure url="https://media.transistor.fm/de13e0af/fa6ce227.mp3" length="26620387" type="audio/mpeg"/>
      <itunes:author>You Gotta Hack That</itunes:author>
      <itunes:duration>1663</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>From carbon-copy receipts and zip-zap machines to mag stripes, chip and PIN, contactless and mobile wallets, payment tech keeps evolving, and attackers evolve right alongside it. Felix sits down with Gareth, a payments industry veteran of 30 years, to unpack the real hardware attack surface: skimmers in stripe readers, ATM overlays, contactless relay tricks, and why static QR codes are basically begging to be abused. They also dig into why raising contactless limits changes theft economics, how phone theft turns into credential theft, and why the EU Cyber Resilience Act means you need to think about hardware security now.</p>]]>
      </itunes:summary>
      <itunes:keywords>Internet of things, IoT, Operational Technology, OT, cyber security, hacking, testing, penetration testing, embedded security, industrial control systems, cyber security, cyber assurance, operational technology, OT security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/de13e0af/transcript.txt" type="text/plain"/>
      <podcast:socialInteract protocol="atproto" uri="at://did:plc:xz5znvyfngp6ndbmlw4hiuil/app.bsky.feed.post/3mf4tmo6ty22u"/>
    </item>
    <item>
      <title>Getting a career in OT...</title>
      <itunes:episode>28</itunes:episode>
      <podcast:episode>28</podcast:episode>
      <itunes:title>Getting a career in OT...</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">117269ed-1873-4302-9484-185c2b112a1e</guid>
      <link>https://share.transistor.fm/s/16c6bea6</link>
      <description>
        <![CDATA[<p>In this episode, Felix is joined by Anjan, a cybersecurity engineer working at the sharp end of OT product security and compliance in UK manufacturing. They dig into what it really looks like to build security into connected industrial kit, especially with major regulation deadlines looming. Anjan shares a practical path into the industry, starting with bug bounty and vulnerability disclosure, then moving into IoT and OT during his Masters, including work on an autonomous vehicle project. Expect honest talk on “audit equals secure” myths, risk-based security, and how to start building an OT security career.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, Felix is joined by Anjan, a cybersecurity engineer working at the sharp end of OT product security and compliance in UK manufacturing. They dig into what it really looks like to build security into connected industrial kit, especially with major regulation deadlines looming. Anjan shares a practical path into the industry, starting with bug bounty and vulnerability disclosure, then moving into IoT and OT during his Masters, including work on an autonomous vehicle project. Expect honest talk on “audit equals secure” myths, risk-based security, and how to start building an OT security career.</p>]]>
      </content:encoded>
      <pubDate>Mon, 09 Feb 2026 04:30:00 +0000</pubDate>
      <author>You Gotta Hack That</author>
      <enclosure url="https://media.transistor.fm/16c6bea6/e314fff4.mp3" length="24449480" type="audio/mpeg"/>
      <itunes:author>You Gotta Hack That</itunes:author>
      <itunes:duration>1527</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, Felix is joined by Anjan, a cybersecurity engineer working at the sharp end of OT product security and compliance in UK manufacturing. They dig into what it really looks like to build security into connected industrial kit, especially with major regulation deadlines looming. Anjan shares a practical path into the industry, starting with bug bounty and vulnerability disclosure, then moving into IoT and OT during his Masters, including work on an autonomous vehicle project. Expect honest talk on “audit equals secure” myths, risk-based security, and how to start building an OT security career.</p>]]>
      </itunes:summary>
      <itunes:keywords>Internet of things, IoT, Operational Technology, OT, cyber security, hacking, testing, penetration testing, embedded security, industrial control systems, cyber security, cyber assurance, operational technology, OT security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/16c6bea6/transcript.txt" type="text/plain"/>
      <podcast:socialInteract protocol="atproto" uri="at://did:plc:xz5znvyfngp6ndbmlw4hiuil/app.bsky.feed.post/3mefmgddq2g27"/>
    </item>
    <item>
      <title>And the winner is .... 'lowest compliance effort'</title>
      <itunes:episode>27</itunes:episode>
      <podcast:episode>27</podcast:episode>
      <itunes:title>And the winner is .... 'lowest compliance effort'</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ae4f1d87-e47f-4f96-a0db-7a0bbd9de8d7</guid>
      <link>https://share.transistor.fm/s/25d4f2ae</link>
      <description>
        <![CDATA[<p>In this episode, Felix continues his conversation with David Rogers (Copper Horse) about the latest State of Vulnerability Disclosure report and why “what counts as IoT” is messy. They explore how consumer devices end up everywhere (including factories), how category labels can become compliance loopholes, and why good vulnerability disclosure needs more than a generic support page. David also shares concerns about the EU Cyber Resilience Act drifting toward tick-box compliance, and what that could mean for product security teams and, ultimately, all of us. Plus: the report’s dataset is open for anyone to check.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, Felix continues his conversation with David Rogers (Copper Horse) about the latest State of Vulnerability Disclosure report and why “what counts as IoT” is messy. They explore how consumer devices end up everywhere (including factories), how category labels can become compliance loopholes, and why good vulnerability disclosure needs more than a generic support page. David also shares concerns about the EU Cyber Resilience Act drifting toward tick-box compliance, and what that could mean for product security teams and, ultimately, all of us. Plus: the report’s dataset is open for anyone to check.</p>]]>
      </content:encoded>
      <pubDate>Thu, 05 Feb 2026 04:00:00 +0000</pubDate>
      <author>You Gotta Hack That</author>
      <enclosure url="https://media.transistor.fm/25d4f2ae/ab47127e.mp3" length="16653714" type="audio/mpeg"/>
      <itunes:author>You Gotta Hack That</itunes:author>
      <itunes:duration>1040</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, Felix continues his conversation with David Rogers (Copper Horse) about the latest State of Vulnerability Disclosure report and why “what counts as IoT” is messy. They explore how consumer devices end up everywhere (including factories), how category labels can become compliance loopholes, and why good vulnerability disclosure needs more than a generic support page. David also shares concerns about the EU Cyber Resilience Act drifting toward tick-box compliance, and what that could mean for product security teams and, ultimately, all of us. Plus: the report’s dataset is open for anyone to check.</p>]]>
      </itunes:summary>
      <itunes:keywords>Internet of things, IoT, Operational Technology, OT, cyber security, hacking, testing, penetration testing, embedded security, industrial control systems, cyber security, cyber assurance, operational technology, OT security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/25d4f2ae/transcript.txt" type="text/plain"/>
      <podcast:socialInteract protocol="atproto" uri="at://did:plc:xz5znvyfngp6ndbmlw4hiuil/app.bsky.feed.post/3me3iv6mlac27"/>
    </item>
    <item>
      <title>Ever heard of an insecurity canary?</title>
      <itunes:episode>26</itunes:episode>
      <podcast:episode>26</podcast:episode>
      <itunes:title>Ever heard of an insecurity canary?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1d7be301-c8b5-4804-88a1-bcf40f1f07c3</guid>
      <link>https://share.transistor.fm/s/758c779a</link>
      <description>
        <![CDATA[<p>In the first of this two-part episode, Felix is joined by David Rogers (Copper Horse) to unpack a surprisingly powerful way to measure IoT security: vulnerability disclosure policies. David shares what eight years of research reveals about how easy (or impossible) it can be for security researchers to report flaws. We discuss why the lack of a clear route to report vulnerabilities to a vendor is an “insecurity canary” and how security researchers and businesses struggle to get along without enabling easy communications on these topics. We dig into the results from the Copper Horse annual report, the impact of new regulation, and why retailers might be the hidden force improving the market. Plus: the long tail of ultra-cheap devices, and why security shouldn’t be a luxury.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In the first of this two-part episode, Felix is joined by David Rogers (Copper Horse) to unpack a surprisingly powerful way to measure IoT security: vulnerability disclosure policies. David shares what eight years of research reveals about how easy (or impossible) it can be for security researchers to report flaws. We discuss why the lack of a clear route to report vulnerabilities to a vendor is an “insecurity canary” and how security researchers and businesses struggle to get along without enabling easy communications on these topics. We dig into the results from the Copper Horse annual report, the impact of new regulation, and why retailers might be the hidden force improving the market. Plus: the long tail of ultra-cheap devices, and why security shouldn’t be a luxury.</p>]]>
      </content:encoded>
      <pubDate>Mon, 26 Jan 2026 02:31:11 +0000</pubDate>
      <author>You Gotta Hack That</author>
      <enclosure url="https://media.transistor.fm/758c779a/e24900d5.mp3" length="21114214" type="audio/mpeg"/>
      <itunes:author>You Gotta Hack That</itunes:author>
      <itunes:duration>1318</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In the first of this two-part episode, Felix is joined by David Rogers (Copper Horse) to unpack a surprisingly powerful way to measure IoT security: vulnerability disclosure policies. David shares what eight years of research reveals about how easy (or impossible) it can be for security researchers to report flaws. We discuss why the lack of a clear route to report vulnerabilities to a vendor is an “insecurity canary” and how security researchers and businesses struggle to get along without enabling easy communications on these topics. We dig into the results from the Copper Horse annual report, the impact of new regulation, and why retailers might be the hidden force improving the market. Plus: the long tail of ultra-cheap devices, and why security shouldn’t be a luxury.</p>]]>
      </itunes:summary>
      <itunes:keywords>Internet of things, IoT, Operational Technology, OT, cyber security, hacking, testing, penetration testing, embedded security, industrial control systems, cyber security, cyber assurance, operational technology, OT security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/758c779a/transcript.txt" type="text/plain"/>
      <podcast:socialInteract protocol="atproto" uri="at://did:plc:xz5znvyfngp6ndbmlw4hiuil/app.bsky.feed.post/3mdc7auvgfu2a"/>
    </item>
    <item>
      <title>OT Threats, Penetration Testing, and Resilience</title>
      <itunes:episode>25</itunes:episode>
      <podcast:episode>25</podcast:episode>
      <itunes:title>OT Threats, Penetration Testing, and Resilience</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">eb88d28e-0afe-44ce-bc6e-f38ceab3c820</guid>
      <link>https://share.transistor.fm/s/fdf9c0a0</link>
      <description>
        <![CDATA[<p>In this episode of the You Gotta Hack That podcast, the conversation continues with Emily, a principal industrial cyber security consultant, as they delve into the real-world threats facing operational technology (OT) environments. The discussion highlights the inadequacies of traditional IT penetration testing when applied to OT networks, emphasizing the need for tailored approaches that consider the unique vulnerabilities and operational realities of these systems. Emily and Felix explore the concept of dwell time, illustrating how sophisticated attackers can remain undetected within networks for extended periods, gathering intelligence before launching attacks. They stress the importance of understanding actual risks and the necessity of continuous monitoring and testing to ensure robust cyber security measures are in place.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of the You Gotta Hack That podcast, the conversation continues with Emily, a principal industrial cyber security consultant, as they delve into the real-world threats facing operational technology (OT) environments. The discussion highlights the inadequacies of traditional IT penetration testing when applied to OT networks, emphasizing the need for tailored approaches that consider the unique vulnerabilities and operational realities of these systems. Emily and Felix explore the concept of dwell time, illustrating how sophisticated attackers can remain undetected within networks for extended periods, gathering intelligence before launching attacks. They stress the importance of understanding actual risks and the necessity of continuous monitoring and testing to ensure robust cyber security measures are in place.</p>]]>
      </content:encoded>
      <pubDate>Wed, 21 Jan 2026 04:00:00 +0000</pubDate>
      <author>You Gotta Hack That</author>
      <enclosure url="https://media.transistor.fm/fdf9c0a0/ce7f22fc.mp3" length="23565100" type="audio/mpeg"/>
      <itunes:author>You Gotta Hack That</itunes:author>
      <itunes:duration>1472</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of the You Gotta Hack That podcast, the conversation continues with Emily, a principal industrial cyber security consultant, as they delve into the real-world threats facing operational technology (OT) environments. The discussion highlights the inadequacies of traditional IT penetration testing when applied to OT networks, emphasizing the need for tailored approaches that consider the unique vulnerabilities and operational realities of these systems. Emily and Felix explore the concept of dwell time, illustrating how sophisticated attackers can remain undetected within networks for extended periods, gathering intelligence before launching attacks. They stress the importance of understanding actual risks and the necessity of continuous monitoring and testing to ensure robust cyber security measures are in place.</p>]]>
      </itunes:summary>
      <itunes:keywords>Internet of things, IoT, Operational Technology, OT, cyber security, hacking, testing, penetration testing, embedded security, industrial control systems, cyber security, cyber assurance, operational technology, OT security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/fdf9c0a0/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Demystifying ISA 62443</title>
      <itunes:episode>24</itunes:episode>
      <podcast:episode>24</podcast:episode>
      <itunes:title>Demystifying ISA 62443</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8755afe3-f8a3-4a03-8e91-876649393ac4</guid>
      <link>https://share.transistor.fm/s/e32e34c9</link>
      <description>
        <![CDATA[<p>In this episode of <em>You Gotta Hack That</em>, Felix sits down with Emily, a principal industrial cyber security consultant and former national utility cyber lead, to demystify ISA/IEC 62443. Why do so many teams treat it like a silver bullet and why does that backfire fast? Emily breaks down what 62443 actually is (spoiler: it’s a <em>family</em> of standards), why “be compliant” isn’t a requirement, and why maintenance matters as much as deployment. If you’re trying to secure OT environments, this one will help you focus on what to do first.</p><p>And don't forget to <strong>check out our training courses</strong> to get hands-on and nerdy.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of <em>You Gotta Hack That</em>, Felix sits down with Emily, a principal industrial cyber security consultant and former national utility cyber lead, to demystify ISA/IEC 62443. Why do so many teams treat it like a silver bullet and why does that backfire fast? Emily breaks down what 62443 actually is (spoiler: it’s a <em>family</em> of standards), why “be compliant” isn’t a requirement, and why maintenance matters as much as deployment. If you’re trying to secure OT environments, this one will help you focus on what to do first.</p><p>And don't forget to <strong>check out our training courses</strong> to get hands-on and nerdy.</p>]]>
      </content:encoded>
      <pubDate>Mon, 12 Jan 2026 05:00:00 +0000</pubDate>
      <author>You Gotta Hack That</author>
      <enclosure url="https://media.transistor.fm/e32e34c9/64c6c1fb.mp3" length="23468526" type="audio/mpeg"/>
      <itunes:author>You Gotta Hack That</itunes:author>
      <itunes:duration>1466</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of <em>You Gotta Hack That</em>, Felix sits down with Emily, a principal industrial cyber security consultant and former national utility cyber lead, to demystify ISA/IEC 62443. Why do so many teams treat it like a silver bullet and why does that backfire fast? Emily breaks down what 62443 actually is (spoiler: it’s a <em>family</em> of standards), why “be compliant” isn’t a requirement, and why maintenance matters as much as deployment. If you’re trying to secure OT environments, this one will help you focus on what to do first.</p><p>And don't forget to <strong>check out our training courses</strong> to get hands-on and nerdy.</p>]]>
      </itunes:summary>
      <itunes:keywords>Internet of things, IoT, Operational Technology, OT, cyber security, hacking, testing, penetration testing, embedded security, industrial control systems, cyber security, cyber assurance, operational technology, OT security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/e32e34c9/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>The implications of phone theft</title>
      <itunes:episode>23</itunes:episode>
      <podcast:episode>23</podcast:episode>
      <itunes:title>The implications of phone theft</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3d088956-f008-42f1-a23b-6b1b79df8e90</guid>
      <link>https://yougottahackthat.com/insights/the-implications-of-phone-theft</link>
      <description>
        <![CDATA[<p>In this episode, Felix and Alex discuss the alarming rise of phone thefts in London, sharing personal anecdotes and insights into the implications of losing a device. They explore security measures, user behaviors, and the broader impact of identity theft in today's digital age. The conversation emphasizes the importance of enhancing phone security and being proactive in protecting personal information.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, Felix and Alex discuss the alarming rise of phone thefts in London, sharing personal anecdotes and insights into the implications of losing a device. They explore security measures, user behaviors, and the broader impact of identity theft in today's digital age. The conversation emphasizes the importance of enhancing phone security and being proactive in protecting personal information.</p>]]>
      </content:encoded>
      <pubDate>Thu, 08 May 2025 01:50:19 +0100</pubDate>
      <author>You Gotta Hack That</author>
      <enclosure url="https://media.transistor.fm/4a8a5cd6/5b2e6da9.mp3" length="17295696" type="audio/mpeg"/>
      <itunes:author>You Gotta Hack That</itunes:author>
      <itunes:duration>1080</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, Felix and Alex discuss the alarming rise of phone thefts in London, sharing personal anecdotes and insights into the implications of losing a device. They explore security measures, user behaviors, and the broader impact of identity theft in today's digital age. The conversation emphasizes the importance of enhancing phone security and being proactive in protecting personal information.</p>]]>
      </itunes:summary>
      <itunes:keywords>Internet of things, IoT, Operational Technology, OT, cyber security, hacking, testing, penetration testing, embedded security, industrial control systems, cyber security, cyber assurance, operational technology, OT security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/4a8a5cd6/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Autonomous ships, cyber security and the workboat code</title>
      <itunes:episode>22</itunes:episode>
      <podcast:episode>22</podcast:episode>
      <itunes:title>Autonomous ships, cyber security and the workboat code</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">dce43531-6d61-444b-8c5e-00359324a202</guid>
      <link>https://yougottahackthat.com/insights/autonomous-ships-cyber-security-and-the-workboat-code</link>
      <description>
        <![CDATA[<p>In this conversation, Felix and Oli discuss the development of a hydrogen-powered uncrewed surface vessel (USV) and the associated cybersecurity challenges. They explore the importance of integrating cybersecurity measures from the outset, navigating regulatory frameworks like Workboat Code 3, and the ongoing challenges of ensuring compliance and safety in a rapidly evolving technological landscape. The discussion highlights the need for thorough documentation, the role of regulations in shaping industry practices, and the future of cybersecurity in maritime technology.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this conversation, Felix and Oli discuss the development of a hydrogen-powered uncrewed surface vessel (USV) and the associated cybersecurity challenges. They explore the importance of integrating cybersecurity measures from the outset, navigating regulatory frameworks like Workboat Code 3, and the ongoing challenges of ensuring compliance and safety in a rapidly evolving technological landscape. The discussion highlights the need for thorough documentation, the role of regulations in shaping industry practices, and the future of cybersecurity in maritime technology.</p>]]>
      </content:encoded>
      <pubDate>Thu, 17 Apr 2025 02:00:00 +0100</pubDate>
      <author>You Gotta Hack That</author>
      <enclosure url="https://media.transistor.fm/d1c5662d/779a6dad.mp3" length="9193138" type="audio/mpeg"/>
      <itunes:author>You Gotta Hack That</itunes:author>
      <itunes:duration>1146</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this conversation, Felix and Oli discuss the development of a hydrogen-powered uncrewed surface vessel (USV) and the associated cybersecurity challenges. They explore the importance of integrating cybersecurity measures from the outset, navigating regulatory frameworks like Workboat Code 3, and the ongoing challenges of ensuring compliance and safety in a rapidly evolving technological landscape. The discussion highlights the need for thorough documentation, the role of regulations in shaping industry practices, and the future of cybersecurity in maritime technology.</p>]]>
      </itunes:summary>
      <itunes:keywords>Internet of things, IoT, Operational Technology, OT, cyber security, hacking, testing, penetration testing, embedded security, industrial control systems, cyber security, cyber assurance, operational technology, OT security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/d1c5662d/transcript.txt" type="text/plain"/>
    </item>
    <item>
      <title>Attacking Santa's Christmas deliveries</title>
      <itunes:episode>21</itunes:episode>
      <podcast:episode>21</podcast:episode>
      <itunes:title>Attacking Santa's Christmas deliveries</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e83d3f36-5d93-4196-a4e0-59e66382d43d</guid>
      <link>https://yougottahackthat.com/insights/attacking-santas-christmas-deliveries</link>
      <description>
        <![CDATA[<p>Felix and Alex discuss the attack surface and disruption opportunities for a Cyber attack against Santa's Christmas delivery schedule.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Felix and Alex discuss the attack surface and disruption opportunities for a Cyber attack against Santa's Christmas delivery schedule.</p>]]>
      </content:encoded>
      <pubDate>Wed, 18 Dec 2024 02:00:00 +0000</pubDate>
      <author>You Gotta Hack That</author>
      <enclosure url="https://media.transistor.fm/079581dc/99dc14d2.mp3" length="28505915" type="audio/mpeg"/>
      <itunes:author>You Gotta Hack That</itunes:author>
      <itunes:duration>1187</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Felix and Alex discuss the attack surface and disruption opportunities for a Cyber attack against Santa's Christmas delivery schedule.</p>]]>
      </itunes:summary>
      <itunes:keywords>Internet of things, IoT, Operational Technology, OT, cyber security, hacking, testing, penetration testing, embedded security, industrial control systems, cyber security, cyber assurance, operational technology, OT security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Railways and trains</title>
      <itunes:episode>20</itunes:episode>
      <podcast:episode>20</podcast:episode>
      <itunes:title>Railways and trains</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4ed00d14-3eb3-4530-a591-439b431b912b</guid>
      <link>https://share.transistor.fm/s/89be152d</link>
      <description>
        <![CDATA[<p>Most people think of trains and railways as being great big lumps of metal that (hopefully) whizz along long shiny tracks, but it turns out they are incredibly complex and have a broad attack surface!</p><p>Email Felix using helpme@yg.ht</p><p>Find You Gotta Hack That on X @gotta_hack</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Most people think of trains and railways as being great big lumps of metal that (hopefully) whizz along long shiny tracks, but it turns out they are incredibly complex and have a broad attack surface!</p><p>Email Felix using helpme@yg.ht</p><p>Find You Gotta Hack That on X @gotta_hack</p>]]>
      </content:encoded>
      <pubDate>Tue, 20 Feb 2024 02:00:00 +0000</pubDate>
      <author>You Gotta Hack That</author>
      <enclosure url="https://media.transistor.fm/89be152d/dd3ed57e.mp3" length="19014389" type="audio/mpeg"/>
      <itunes:author>You Gotta Hack That</itunes:author>
      <itunes:duration>1262</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Most people think of trains and railways as being great big lumps of metal that (hopefully) whizz along long shiny tracks, but it turns out they are incredibly complex and have a broad attack surface!</p><p>Email Felix using helpme@yg.ht</p><p>Find You Gotta Hack That on X @gotta_hack</p>]]>
      </itunes:summary>
      <itunes:keywords>Internet of things, IoT, Operational Technology, OT, cyber security, hacking, testing, penetration testing, embedded security, industrial control systems, cyber security, cyber assurance, operational technology, OT security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Vulnerability research into SolaX Inverter Smart Connectivity</title>
      <itunes:episode>19</itunes:episode>
      <podcast:episode>19</podcast:episode>
      <itunes:title>Vulnerability research into SolaX Inverter Smart Connectivity</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">771cc8ea-ee2b-4d2f-b7c3-fcfbda0f6fbb</guid>
      <link>https://share.transistor.fm/s/bc86155d</link>
      <description>
        <![CDATA[<p>Felix describes research completed against the SolaX Pocket WiFi module that connects SolaX inverters to the Internet for smart connectivity features. The research highlights some of the challenges experienced by researchers and developers alike as well as the risks that these vulnerabilities present.</p><p>Email Felix using helpme@yg.ht</p><p>Find You Gotta Hack That on X @gotta_hack</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Felix describes research completed against the SolaX Pocket WiFi module that connects SolaX inverters to the Internet for smart connectivity features. The research highlights some of the challenges experienced by researchers and developers alike as well as the risks that these vulnerabilities present.</p><p>Email Felix using helpme@yg.ht</p><p>Find You Gotta Hack That on X @gotta_hack</p>]]>
      </content:encoded>
      <pubDate>Tue, 06 Feb 2024 02:00:00 +0000</pubDate>
      <author>You Gotta Hack That</author>
      <enclosure url="https://media.transistor.fm/bc86155d/c8747a01.mp3" length="13559519" type="audio/mpeg"/>
      <itunes:author>You Gotta Hack That</itunes:author>
      <itunes:duration>937</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Felix describes research completed against the SolaX Pocket WiFi module that connects SolaX inverters to the Internet for smart connectivity features. The research highlights some of the challenges experienced by researchers and developers alike as well as the risks that these vulnerabilities present.</p><p>Email Felix using helpme@yg.ht</p><p>Find You Gotta Hack That on X @gotta_hack</p>]]>
      </itunes:summary>
      <itunes:keywords>Internet of things, IoT, Operational Technology, OT, cyber security, hacking, testing, penetration testing, embedded security, industrial control systems, cyber security, cyber assurance, operational technology, OT security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cars</title>
      <itunes:episode>18</itunes:episode>
      <podcast:episode>18</podcast:episode>
      <itunes:title>Cars</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">dcb7515d-dd37-4ca1-926a-68e0988ba4cd</guid>
      <link>https://share.transistor.fm/s/d43560d3</link>
      <description>
        <![CDATA[<p>In this episode Felix looks at the complexities and attack surface of modern cars. They may have become more sophisticated but are<br>they now technologically fragile?</p><p>Email Felix using helpme@yg.ht</p><p>Find You Gotta Hack That on X @gotta_hack</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode Felix looks at the complexities and attack surface of modern cars. They may have become more sophisticated but are<br>they now technologically fragile?</p><p>Email Felix using helpme@yg.ht</p><p>Find You Gotta Hack That on X @gotta_hack</p>]]>
      </content:encoded>
      <pubDate>Wed, 24 Jan 2024 16:45:00 +0000</pubDate>
      <author>You Gotta Hack That</author>
      <enclosure url="https://media.transistor.fm/d43560d3/acdc8b4b.mp3" length="14681702" type="audio/mpeg"/>
      <itunes:author>You Gotta Hack That</itunes:author>
      <itunes:duration>1006</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode Felix looks at the complexities and attack surface of modern cars. They may have become more sophisticated but are<br>they now technologically fragile?</p><p>Email Felix using helpme@yg.ht</p><p>Find You Gotta Hack That on X @gotta_hack</p>]]>
      </itunes:summary>
      <itunes:keywords>Internet of things, IoT, Operational Technology, OT, cyber security, hacking, testing, penetration testing, embedded security, industrial control systems, cyber security, cyber assurance, operational technology, OT security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Prosthetics</title>
      <itunes:episode>17</itunes:episode>
      <podcast:episode>17</podcast:episode>
      <itunes:title>Prosthetics</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">222a8577-515d-4d27-983b-160192a54116</guid>
      <link>https://share.transistor.fm/s/5e28c422</link>
      <description>
        <![CDATA[<p>Felix analyses the security within modern smart-prosthetics and medical tech to help prevent the need for amputations. The security need behind these two devices is not always immediately apparent because some people might think of it as being 'boring medical data'. Cyber security concerns are still there none-the-less, just in a slightly different form.</p><p>Email Felix using helpme@yg.ht</p><p>Find You Gotta Hack That on Twitter @gotta_hack</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Felix analyses the security within modern smart-prosthetics and medical tech to help prevent the need for amputations. The security need behind these two devices is not always immediately apparent because some people might think of it as being 'boring medical data'. Cyber security concerns are still there none-the-less, just in a slightly different form.</p><p>Email Felix using helpme@yg.ht</p><p>Find You Gotta Hack That on Twitter @gotta_hack</p>]]>
      </content:encoded>
      <pubDate>Thu, 01 Jun 2023 02:00:00 +0100</pubDate>
      <author>You Gotta Hack That</author>
      <enclosure url="https://media.transistor.fm/5e28c422/2142137a.mp3" length="11037632" type="audio/mpeg"/>
      <itunes:author>You Gotta Hack That</itunes:author>
      <itunes:duration>756</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Felix analyses the security within modern smart-prosthetics and medical tech to help prevent the need for amputations. The security need behind these two devices is not always immediately apparent because some people might think of it as being 'boring medical data'. Cyber security concerns are still there none-the-less, just in a slightly different form.</p><p>Email Felix using helpme@yg.ht</p><p>Find You Gotta Hack That on Twitter @gotta_hack</p>]]>
      </itunes:summary>
      <itunes:keywords>Internet of things, IoT, Operational Technology, OT, cyber security, hacking, testing, penetration testing, embedded security, industrial control systems, cyber security, cyber assurance, operational technology, OT security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Medical Imaging Devices</title>
      <itunes:episode>16</itunes:episode>
      <podcast:episode>16</podcast:episode>
      <itunes:title>Medical Imaging Devices</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">29da697b-5731-4114-a7be-056391d92fed</guid>
      <link>https://share.transistor.fm/s/cd202a57</link>
      <description>
        <![CDATA[<p>Felix delves in the technology that supports MRI scanners, X-Ray machines and CT scanners and looks at the vulnerabilities they have had in the past as well as potential opportunities for them to fall foul of attackers. The technology here focuses on the DICOM and HL7 protocols both of which have had security concerns but are used globally to ensure doctors remain connected to their patients medical images.</p><p>Email Felix using helpme@yg.ht</p><p>Find You Gotta Hack That on Twitter @gotta_hack</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Felix delves in the technology that supports MRI scanners, X-Ray machines and CT scanners and looks at the vulnerabilities they have had in the past as well as potential opportunities for them to fall foul of attackers. The technology here focuses on the DICOM and HL7 protocols both of which have had security concerns but are used globally to ensure doctors remain connected to their patients medical images.</p><p>Email Felix using helpme@yg.ht</p><p>Find You Gotta Hack That on Twitter @gotta_hack</p>]]>
      </content:encoded>
      <pubDate>Thu, 25 May 2023 02:00:00 +0100</pubDate>
      <author>You Gotta Hack That</author>
      <enclosure url="https://media.transistor.fm/cd202a57/8c42d7bc.mp3" length="18965876" type="audio/mpeg"/>
      <itunes:author>You Gotta Hack That</itunes:author>
      <itunes:duration>1321</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Felix delves in the technology that supports MRI scanners, X-Ray machines and CT scanners and looks at the vulnerabilities they have had in the past as well as potential opportunities for them to fall foul of attackers. The technology here focuses on the DICOM and HL7 protocols both of which have had security concerns but are used globally to ensure doctors remain connected to their patients medical images.</p><p>Email Felix using helpme@yg.ht</p><p>Find You Gotta Hack That on Twitter @gotta_hack</p>]]>
      </itunes:summary>
      <itunes:keywords>Internet of things, IoT, Operational Technology, OT, cyber security, hacking, testing, penetration testing, embedded security, industrial control systems, cyber security, cyber assurance, operational technology, OT security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Wearable Tech</title>
      <itunes:episode>15</itunes:episode>
      <podcast:episode>15</podcast:episode>
      <itunes:title>Wearable Tech</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">22565a22-097c-4167-bb66-c5008a275b96</guid>
      <link>https://share.transistor.fm/s/ef943da9</link>
      <description>
        <![CDATA[<p>Wearable tech is increasingly popular with consumers worldwide. It's become a class of tech that is so ubiquitous that privacy and cyber security concerns have to be taken seriously. In this episode we look at the Bluetooth Low Energy (BLE) protocol which makes the vast majority of this technology possible.</p><p>Email Felix using helpme@yg.ht</p><p>Find You Gotta Hack That on Twitter @gotta_hack</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Wearable tech is increasingly popular with consumers worldwide. It's become a class of tech that is so ubiquitous that privacy and cyber security concerns have to be taken seriously. In this episode we look at the Bluetooth Low Energy (BLE) protocol which makes the vast majority of this technology possible.</p><p>Email Felix using helpme@yg.ht</p><p>Find You Gotta Hack That on Twitter @gotta_hack</p>]]>
      </content:encoded>
      <pubDate>Thu, 18 May 2023 02:00:00 +0100</pubDate>
      <author>You Gotta Hack That</author>
      <enclosure url="https://media.transistor.fm/ef943da9/945c740c.mp3" length="17517806" type="audio/mpeg"/>
      <itunes:author>You Gotta Hack That</itunes:author>
      <itunes:duration>1225</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Wearable tech is increasingly popular with consumers worldwide. It's become a class of tech that is so ubiquitous that privacy and cyber security concerns have to be taken seriously. In this episode we look at the Bluetooth Low Energy (BLE) protocol which makes the vast majority of this technology possible.</p><p>Email Felix using helpme@yg.ht</p><p>Find You Gotta Hack That on Twitter @gotta_hack</p>]]>
      </itunes:summary>
      <itunes:keywords>Internet of things, IoT, Operational Technology, OT, cyber security, hacking, testing, penetration testing, embedded security, industrial control systems, cyber security, cyber assurance, operational technology, OT security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Continuous Glucose Monitors (CGMs)</title>
      <itunes:episode>14</itunes:episode>
      <podcast:episode>14</podcast:episode>
      <itunes:title>Continuous Glucose Monitors (CGMs)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8e7622f4-b2b9-4797-b494-735cd9f9d815</guid>
      <link>https://share.transistor.fm/s/fb22a15e</link>
      <description>
        <![CDATA[<p>In this episode Felix investigates Glucose Monitors.  He looks at their cyber security profile and discusses Near Field Communications (NFC) which is a commonly used protocol to communicate between smart phones and the little device.</p><p>Email Felix using helpme@yg.ht</p><p>Find You Gotta Hack That on Twitter @gotta_hack</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode Felix investigates Glucose Monitors.  He looks at their cyber security profile and discusses Near Field Communications (NFC) which is a commonly used protocol to communicate between smart phones and the little device.</p><p>Email Felix using helpme@yg.ht</p><p>Find You Gotta Hack That on Twitter @gotta_hack</p>]]>
      </content:encoded>
      <pubDate>Wed, 26 Apr 2023 02:00:00 +0100</pubDate>
      <author>You Gotta Hack That</author>
      <enclosure url="https://media.transistor.fm/fb22a15e/68aab635.mp3" length="14334199" type="audio/mpeg"/>
      <itunes:author>You Gotta Hack That</itunes:author>
      <itunes:duration>922</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode Felix investigates Glucose Monitors.  He looks at their cyber security profile and discusses Near Field Communications (NFC) which is a commonly used protocol to communicate between smart phones and the little device.</p><p>Email Felix using helpme@yg.ht</p><p>Find You Gotta Hack That on Twitter @gotta_hack</p>]]>
      </itunes:summary>
      <itunes:keywords>Internet of things, IoT, Operational Technology, OT, cyber security, hacking, testing, penetration testing, embedded security, industrial control systems, cyber security, cyber assurance, operational technology, OT security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Insulin pumps</title>
      <itunes:episode>13</itunes:episode>
      <podcast:episode>13</podcast:episode>
      <itunes:title>Insulin pumps</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">92d39db6-6794-41e7-bdf6-c4bbb6b32947</guid>
      <link>https://share.transistor.fm/s/3d6e2db2</link>
      <description>
        <![CDATA[<p>Felix looks at the slightly murky history of the cyber security behind insulin pumps. These devices have a bad security reputation, but, it isn't that straight forward.</p><p>Email Felix using helpme@yg.ht</p><p>Find You Gotta Hack That on Twitter @gotta_hack</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Felix looks at the slightly murky history of the cyber security behind insulin pumps. These devices have a bad security reputation, but, it isn't that straight forward.</p><p>Email Felix using helpme@yg.ht</p><p>Find You Gotta Hack That on Twitter @gotta_hack</p>]]>
      </content:encoded>
      <pubDate>Wed, 19 Apr 2023 02:00:00 +0100</pubDate>
      <author>You Gotta Hack That</author>
      <enclosure url="https://media.transistor.fm/3d6e2db2/c1f44772.mp3" length="17616531" type="audio/mpeg"/>
      <itunes:author>You Gotta Hack That</itunes:author>
      <itunes:duration>1236</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Felix looks at the slightly murky history of the cyber security behind insulin pumps. These devices have a bad security reputation, but, it isn't that straight forward.</p><p>Email Felix using helpme@yg.ht</p><p>Find You Gotta Hack That on Twitter @gotta_hack</p>]]>
      </itunes:summary>
      <itunes:keywords>Internet of things, IoT, Operational Technology, OT, cyber security, hacking, testing, penetration testing, embedded security, industrial control systems, cyber security, cyber assurance, operational technology, OT security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Pacemakers</title>
      <itunes:episode>12</itunes:episode>
      <podcast:episode>12</podcast:episode>
      <itunes:title>Pacemakers</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">484bc360-848a-4c5f-a14f-91052a95e691</guid>
      <link>https://share.transistor.fm/s/5b500af6</link>
      <description>
        <![CDATA[<p>Pacemakers are surprising prevalent and have been around for years.  These devices keep people alive but have a difficult cyber security history.  Felix looks at how these devices work and what security challenges they face.</p><p>Email Felix using helpme@yg.ht<br>Find You Gotta Hack That on Twitter @gotta_hack</p><p>yougottahackthat.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Pacemakers are surprising prevalent and have been around for years.  These devices keep people alive but have a difficult cyber security history.  Felix looks at how these devices work and what security challenges they face.</p><p>Email Felix using helpme@yg.ht<br>Find You Gotta Hack That on Twitter @gotta_hack</p><p>yougottahackthat.com</p>]]>
      </content:encoded>
      <pubDate>Wed, 12 Apr 2023 02:00:00 +0100</pubDate>
      <author>You Gotta Hack That</author>
      <enclosure url="https://media.transistor.fm/5b500af6/fd904cc7.mp3" length="17693869" type="audio/mpeg"/>
      <itunes:author>You Gotta Hack That</itunes:author>
      <itunes:duration>1042</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Pacemakers are surprising prevalent and have been around for years.  These devices keep people alive but have a difficult cyber security history.  Felix looks at how these devices work and what security challenges they face.</p><p>Email Felix using helpme@yg.ht<br>Find You Gotta Hack That on Twitter @gotta_hack</p><p>yougottahackthat.com</p>]]>
      </itunes:summary>
      <itunes:keywords>Internet of things, IoT, Operational Technology, OT, cyber security, hacking, testing, penetration testing, embedded security, industrial control systems, cyber security, cyber assurance, operational technology, OT security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>The IoT and embedded systems penetration testing process</title>
      <itunes:episode>11</itunes:episode>
      <podcast:episode>11</podcast:episode>
      <itunes:title>The IoT and embedded systems penetration testing process</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f8da328b-ff90-4b8f-bd26-ca61138f902f</guid>
      <link>https://share.transistor.fm/s/be296b11</link>
      <description>
        <![CDATA[<p>Felix discusses what makes a good penetration testing process, the difficulties that are unique to the Internet of Things and embedded systems, and how best to approach getting good security assurance.</p><p>Email Felix using helpme@yg.ht<br>Find You Gotta Hack That on Twitter @gotta_hack</p><p>yougottahackthat.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Felix discusses what makes a good penetration testing process, the difficulties that are unique to the Internet of Things and embedded systems, and how best to approach getting good security assurance.</p><p>Email Felix using helpme@yg.ht<br>Find You Gotta Hack That on Twitter @gotta_hack</p><p>yougottahackthat.com</p>]]>
      </content:encoded>
      <pubDate>Wed, 05 Apr 2023 02:00:00 +0100</pubDate>
      <author>You Gotta Hack That</author>
      <enclosure url="https://media.transistor.fm/be296b11/60261a00.mp3" length="26799563" type="audio/mpeg"/>
      <itunes:author>You Gotta Hack That</itunes:author>
      <itunes:duration>1544</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Felix discusses what makes a good penetration testing process, the difficulties that are unique to the Internet of Things and embedded systems, and how best to approach getting good security assurance.</p><p>Email Felix using helpme@yg.ht<br>Find You Gotta Hack That on Twitter @gotta_hack</p><p>yougottahackthat.com</p>]]>
      </itunes:summary>
      <itunes:keywords>Internet of things, IoT, Operational Technology, OT, cyber security, hacking, testing, penetration testing, embedded security, industrial control systems, cyber security, cyber assurance, operational technology, OT security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>CCTV systems</title>
      <itunes:episode>10</itunes:episode>
      <podcast:episode>10</podcast:episode>
      <itunes:title>CCTV systems</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">33bb5529-9b51-4b14-954f-be6732228cbc</guid>
      <link>https://share.transistor.fm/s/dfdbc001</link>
      <description>
        <![CDATA[<p>CCTV systems have a bad reputation when it comes to cyber security.  Felix looks at the attack surface of CCTV systems and discusses how these systems are more complex than most people realise and how that results in them being abused.</p><p>Email Felix using helpme@yg.ht<br>Find You Gotta Hack That on Twitter @gotta_hack</p><p>yougottahackthat.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>CCTV systems have a bad reputation when it comes to cyber security.  Felix looks at the attack surface of CCTV systems and discusses how these systems are more complex than most people realise and how that results in them being abused.</p><p>Email Felix using helpme@yg.ht<br>Find You Gotta Hack That on Twitter @gotta_hack</p><p>yougottahackthat.com</p>]]>
      </content:encoded>
      <pubDate>Wed, 29 Mar 2023 02:00:00 +0100</pubDate>
      <author>You Gotta Hack That</author>
      <enclosure url="https://media.transistor.fm/dfdbc001/b11a7dcb.mp3" length="15791775" type="audio/mpeg"/>
      <itunes:author>You Gotta Hack That</itunes:author>
      <itunes:duration>929</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>CCTV systems have a bad reputation when it comes to cyber security.  Felix looks at the attack surface of CCTV systems and discusses how these systems are more complex than most people realise and how that results in them being abused.</p><p>Email Felix using helpme@yg.ht<br>Find You Gotta Hack That on Twitter @gotta_hack</p><p>yougottahackthat.com</p>]]>
      </itunes:summary>
      <itunes:keywords>Internet of things, IoT, Operational Technology, OT, cyber security, hacking, testing, penetration testing, embedded security, industrial control systems, cyber security, cyber assurance, operational technology, OT security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Occupancy Sensors</title>
      <itunes:episode>9</itunes:episode>
      <podcast:episode>9</podcast:episode>
      <itunes:title>Occupancy Sensors</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">17c4e9c3-23b0-4084-88c6-8c062e76d6db</guid>
      <link>https://share.transistor.fm/s/055d4ba5</link>
      <description>
        <![CDATA[<p>Felix looks at the types of Occupancy Sensors typically used in lighting management and intruder alarm systems. The most common sensor type is the Passive Infra Red (PIR) sensors. These are primitive in some ways but very sophisticated in others.</p><p>Email Felix using helpme@yg.ht<br>Find You Gotta Hack That on Twitter @gotta_hack</p><p>yougottahackthat.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Felix looks at the types of Occupancy Sensors typically used in lighting management and intruder alarm systems. The most common sensor type is the Passive Infra Red (PIR) sensors. These are primitive in some ways but very sophisticated in others.</p><p>Email Felix using helpme@yg.ht<br>Find You Gotta Hack That on Twitter @gotta_hack</p><p>yougottahackthat.com</p>]]>
      </content:encoded>
      <pubDate>Wed, 22 Mar 2023 02:00:00 +0000</pubDate>
      <author>You Gotta Hack That</author>
      <enclosure url="https://media.transistor.fm/055d4ba5/60832efd.mp3" length="15227397" type="audio/mpeg"/>
      <itunes:author>You Gotta Hack That</itunes:author>
      <itunes:duration>866</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Felix looks at the types of Occupancy Sensors typically used in lighting management and intruder alarm systems. The most common sensor type is the Passive Infra Red (PIR) sensors. These are primitive in some ways but very sophisticated in others.</p><p>Email Felix using helpme@yg.ht<br>Find You Gotta Hack That on Twitter @gotta_hack</p><p>yougottahackthat.com</p>]]>
      </itunes:summary>
      <itunes:keywords>Internet of things, IoT, Operational Technology, OT, cyber security, hacking, testing, penetration testing, embedded security, industrial control systems, cyber security, cyber assurance, operational technology, OT security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Fire detection and response systems</title>
      <itunes:episode>8</itunes:episode>
      <podcast:episode>8</podcast:episode>
      <itunes:title>Fire detection and response systems</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e4cf6202-bed8-4405-ab29-bd2193ba7ca1</guid>
      <link>https://share.transistor.fm/s/4b5b2571</link>
      <description>
        <![CDATA[<p>Felix looks in depth at the cyber security implications of fire systems in modern buildings. This particularly focuses on the BACnet protocol - a common element of modern open-protocol systems.</p><p>Email Felix using helpme@yg.ht<br>Find You Gotta Hack That on Twitter @gotta_hack</p><p>yougottahackthat.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Felix looks in depth at the cyber security implications of fire systems in modern buildings. This particularly focuses on the BACnet protocol - a common element of modern open-protocol systems.</p><p>Email Felix using helpme@yg.ht<br>Find You Gotta Hack That on Twitter @gotta_hack</p><p>yougottahackthat.com</p>]]>
      </content:encoded>
      <pubDate>Wed, 15 Mar 2023 02:00:00 +0000</pubDate>
      <author>You Gotta Hack That</author>
      <enclosure url="https://media.transistor.fm/4b5b2571/f4e90708.mp3" length="14539749" type="audio/mpeg"/>
      <itunes:author>You Gotta Hack That</itunes:author>
      <itunes:duration>822</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Felix looks in depth at the cyber security implications of fire systems in modern buildings. This particularly focuses on the BACnet protocol - a common element of modern open-protocol systems.</p><p>Email Felix using helpme@yg.ht<br>Find You Gotta Hack That on Twitter @gotta_hack</p><p>yougottahackthat.com</p>]]>
      </itunes:summary>
      <itunes:keywords>Internet of things, IoT, Operational Technology, OT, cyber security, hacking, testing, penetration testing, embedded security, industrial control systems, cyber security, cyber assurance, operational technology, OT security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Lifts (Elevators) and Escalators</title>
      <itunes:episode>7</itunes:episode>
      <podcast:episode>7</podcast:episode>
      <itunes:title>Lifts (Elevators) and Escalators</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5398871e-9b5d-4299-b928-890b1553df52</guid>
      <link>https://share.transistor.fm/s/7b4a4bc8</link>
      <description>
        <![CDATA[<p>It is easy to take lifts and escalators for granted, but it turns out that modern versions have a huge amount of connectivity.  We delve into all this tech and focus on one type of communications used in modern lilfts and escaltors, called ModBus.  We discuss how ModBus might be attacked, especially when thinking about all the other technologies that are also now connected to these systems.</p><p>Email Felix using helpme@yg.ht<br>Find You Gotta Hack That on Twitter @gotta_hack</p><p>yougottahackthat.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>It is easy to take lifts and escalators for granted, but it turns out that modern versions have a huge amount of connectivity.  We delve into all this tech and focus on one type of communications used in modern lilfts and escaltors, called ModBus.  We discuss how ModBus might be attacked, especially when thinking about all the other technologies that are also now connected to these systems.</p><p>Email Felix using helpme@yg.ht<br>Find You Gotta Hack That on Twitter @gotta_hack</p><p>yougottahackthat.com</p>]]>
      </content:encoded>
      <pubDate>Wed, 08 Mar 2023 02:00:00 +0000</pubDate>
      <author>You Gotta Hack That</author>
      <enclosure url="https://media.transistor.fm/7b4a4bc8/3f6b759b.mp3" length="17198023" type="audio/mpeg"/>
      <itunes:author>You Gotta Hack That</itunes:author>
      <itunes:duration>1206</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>It is easy to take lifts and escalators for granted, but it turns out that modern versions have a huge amount of connectivity.  We delve into all this tech and focus on one type of communications used in modern lilfts and escaltors, called ModBus.  We discuss how ModBus might be attacked, especially when thinking about all the other technologies that are also now connected to these systems.</p><p>Email Felix using helpme@yg.ht<br>Find You Gotta Hack That on Twitter @gotta_hack</p><p>yougottahackthat.com</p>]]>
      </itunes:summary>
      <itunes:keywords>Internet of things, IoT, Operational Technology, OT, cyber security, hacking, testing, penetration testing, embedded security, industrial control systems, cyber security, cyber assurance, operational technology, OT security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>RFID door locks</title>
      <itunes:episode>6</itunes:episode>
      <podcast:episode>6</podcast:episode>
      <itunes:title>RFID door locks</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5cf650b9-598d-4a88-85ab-7c30a8a36f8d</guid>
      <link>https://share.transistor.fm/s/073719c9</link>
      <description>
        <![CDATA[<p>Felix delves into RFID door locks and examines a small portion of the cyber security issues in this space.</p><p>Email Felix using helpme@yg.ht<br>Find You Gotta Hack That on Twitter @gotta_hack</p><p>yougottahackthat.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Felix delves into RFID door locks and examines a small portion of the cyber security issues in this space.</p><p>Email Felix using helpme@yg.ht<br>Find You Gotta Hack That on Twitter @gotta_hack</p><p>yougottahackthat.com</p>]]>
      </content:encoded>
      <pubDate>Wed, 01 Mar 2023 02:00:00 +0000</pubDate>
      <author>You Gotta Hack That</author>
      <enclosure url="https://media.transistor.fm/073719c9/a728cd9d.mp3" length="18943297" type="audio/mpeg"/>
      <itunes:author>You Gotta Hack That</itunes:author>
      <itunes:duration>1233</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Felix delves into RFID door locks and examines a small portion of the cyber security issues in this space.</p><p>Email Felix using helpme@yg.ht<br>Find You Gotta Hack That on Twitter @gotta_hack</p><p>yougottahackthat.com</p>]]>
      </itunes:summary>
      <itunes:keywords>Internet of things, IoT, Operational Technology, OT, cyber security, hacking, testing, penetration testing, embedded security, industrial control systems, cyber security, cyber assurance, operational technology, OT security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Building Management Systems</title>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>Building Management Systems</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">dd8cad8c-49dd-4ce1-b79c-45bf4e056b4c</guid>
      <link>https://share.transistor.fm/s/bf5bc1f8</link>
      <description>
        <![CDATA[<p>We take a look at how Building Management Systems (BMS) are setup and the huge range of cyber security issues that can be present.</p><p>Email Felix using helpme@yg.ht<br>Find You Gotta Hack That on Twitter @gotta_hack</p><p>yougottahackthat.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>We take a look at how Building Management Systems (BMS) are setup and the huge range of cyber security issues that can be present.</p><p>Email Felix using helpme@yg.ht<br>Find You Gotta Hack That on Twitter @gotta_hack</p><p>yougottahackthat.com</p>]]>
      </content:encoded>
      <pubDate>Wed, 22 Feb 2023 02:00:00 +0000</pubDate>
      <author>You Gotta Hack That</author>
      <enclosure url="https://media.transistor.fm/bf5bc1f8/c9aada0d.mp3" length="12700345" type="audio/mpeg"/>
      <itunes:author>You Gotta Hack That</itunes:author>
      <itunes:duration>898</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>We take a look at how Building Management Systems (BMS) are setup and the huge range of cyber security issues that can be present.</p><p>Email Felix using helpme@yg.ht<br>Find You Gotta Hack That on Twitter @gotta_hack</p><p>yougottahackthat.com</p>]]>
      </itunes:summary>
      <itunes:keywords>Internet of things, IoT, Operational Technology, OT, cyber security, hacking, testing, penetration testing, embedded security, industrial control systems, cyber security, cyber assurance, operational technology, OT security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Smart Plugs</title>
      <itunes:episode>4</itunes:episode>
      <podcast:episode>4</podcast:episode>
      <itunes:title>Smart Plugs</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">7e6c389f-e0ff-4456-94f4-c723c5805539</guid>
      <link>https://share.transistor.fm/s/c47e6bf9</link>
      <description>
        <![CDATA[<p>Felix opens two smart plugs and discusses the security of what he finds.  This continues the theme from previous episodes of electricity generation, management, and usage to show how many different angles an attacker could choose to affect our day-to-day lives.</p><p>Email Felix using helpme@yg.ht<br>Find You Gotta Hack That on Twitter @gotta_hack</p><p>yougottahackthat.com</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Felix opens two smart plugs and discusses the security of what he finds.  This continues the theme from previous episodes of electricity generation, management, and usage to show how many different angles an attacker could choose to affect our day-to-day lives.</p><p>Email Felix using helpme@yg.ht<br>Find You Gotta Hack That on Twitter @gotta_hack</p><p>yougottahackthat.com</p>]]>
      </content:encoded>
      <pubDate>Wed, 15 Feb 2023 02:00:00 +0000</pubDate>
      <author>You Gotta Hack That</author>
      <enclosure url="https://media.transistor.fm/c47e6bf9/b2e3da29.mp3" length="14038143" type="audio/mpeg"/>
      <itunes:author>You Gotta Hack That</itunes:author>
      <itunes:duration>1020</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Felix opens two smart plugs and discusses the security of what he finds.  This continues the theme from previous episodes of electricity generation, management, and usage to show how many different angles an attacker could choose to affect our day-to-day lives.</p><p>Email Felix using helpme@yg.ht<br>Find You Gotta Hack That on Twitter @gotta_hack</p><p>yougottahackthat.com</p>]]>
      </itunes:summary>
      <itunes:keywords>Internet of things, IoT, Operational Technology, OT, cyber security, hacking, testing, penetration testing, embedded security, industrial control systems, cyber security, cyber assurance, operational technology, OT security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Delayed attacks against Realtek chips you'll find everywhere</title>
      <itunes:episode>3</itunes:episode>
      <podcast:episode>3</podcast:episode>
      <itunes:title>Delayed attacks against Realtek chips you'll find everywhere</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c79b0977-257f-43a2-b173-70e15f2155c1</guid>
      <link>https://share.transistor.fm/s/d2dbf1ec</link>
      <description>
        <![CDATA[Felix discusses the supply chain issues that allow attackers to take their time when taking advantage of embedded systems.  The vulnerabilities discussed are for the Realtek RTL819xD chip and have IDs CVE-2021-35392, CVE-2021-35393, CVE-2021-35394, and CVE-2021-35395.

Email Felix using helpme@yg.ht
Find You Gotta Hack That on Twitter @gotta_hack

yougottahackthat.com]]>
      </description>
      <content:encoded>
        <![CDATA[Felix discusses the supply chain issues that allow attackers to take their time when taking advantage of embedded systems.  The vulnerabilities discussed are for the Realtek RTL819xD chip and have IDs CVE-2021-35392, CVE-2021-35393, CVE-2021-35394, and CVE-2021-35395.

Email Felix using helpme@yg.ht
Find You Gotta Hack That on Twitter @gotta_hack

yougottahackthat.com]]>
      </content:encoded>
      <pubDate>Wed, 08 Feb 2023 02:00:00 +0000</pubDate>
      <author>You Gotta Hack That</author>
      <enclosure url="https://media.transistor.fm/d2dbf1ec/600d5280.mp3" length="13417659" type="audio/mpeg"/>
      <itunes:author>You Gotta Hack That</itunes:author>
      <itunes:duration>966</itunes:duration>
      <itunes:summary>Felix discusses the supply chain issues that allow attackers to take their time when taking advantage of embedded systems.  The vulnerabilities discussed are for the Realtek RTL819xD chip and have IDs CVE-2021-35392, CVE-2021-35393, CVE-2021-35394, and CVE-2021-35395.

Email Felix using helpme@yg.ht
Find You Gotta Hack That on Twitter @gotta_hack

yougottahackthat.com</itunes:summary>
      <itunes:subtitle>Felix discusses the supply chain issues that allow attackers to take their time when taking advantage of embedded systems.  The vulnerabilities discussed are for the Realtek RTL819xD chip and have IDs CVE-2021-35392, CVE-2021-35393, CVE-2021-35394, and CV</itunes:subtitle>
      <itunes:keywords>Internet of things, IoT, Operational Technology, OT, cyber security, hacking, testing, penetration testing, embedded security, industrial control systems, cyber security, cyber assurance, operational technology, OT security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Domestic Solar Power Systems</title>
      <itunes:episode>2</itunes:episode>
      <podcast:episode>2</podcast:episode>
      <itunes:title>Domestic Solar Power Systems</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">fbdb722a-073a-45df-b9e4-b9832b869a44</guid>
      <link>https://share.transistor.fm/s/748d690b</link>
      <description>
        <![CDATA[Felix looks at the system that supports the solar panels at home and where it might be weak to cyber attack. Warning though, don't play with electrics unless you know what you are doing!

Email Felix using helpme@yg.ht
Find You Gotta Hack That on Twitter @gotta_hack

yougottahackthat.com]]>
      </description>
      <content:encoded>
        <![CDATA[Felix looks at the system that supports the solar panels at home and where it might be weak to cyber attack. Warning though, don't play with electrics unless you know what you are doing!

Email Felix using helpme@yg.ht
Find You Gotta Hack That on Twitter @gotta_hack

yougottahackthat.com]]>
      </content:encoded>
      <pubDate>Wed, 01 Feb 2023 02:00:00 +0000</pubDate>
      <author>You Gotta Hack That</author>
      <enclosure url="https://media.transistor.fm/748d690b/a453b8fe.mp3" length="13231019" type="audio/mpeg"/>
      <itunes:author>You Gotta Hack That</itunes:author>
      <itunes:duration>914</itunes:duration>
      <itunes:summary>Felix looks at the system that supports the solar panels at home and where it might be weak to cyber attack. Warning though, don't play with electrics unless you know what you are doing!

Email Felix using helpme@yg.ht
Find You Gotta Hack That on Twitter @gotta_hack

yougottahackthat.com</itunes:summary>
      <itunes:subtitle>Felix looks at the system that supports the solar panels at home and where it might be weak to cyber attack. Warning though, don't play with electrics unless you know what you are doing!

Email Felix using helpme@yg.ht
Find You Gotta Hack That on Twitt</itunes:subtitle>
      <itunes:keywords>Internet of things, IoT, Operational Technology, OT, cyber security, hacking, testing, penetration testing, embedded security, industrial control systems, cyber security, cyber assurance, operational technology, OT security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Smart meters</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Smart meters</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d1040920-5616-431b-9c42-658c842bdfcc</guid>
      <link>https://share.transistor.fm/s/c2996cce</link>
      <description>
        <![CDATA[Felix takes a look at the security vulnerabilities behind household smart meters. 

Email Felix using helpme@yg.ht
Find You Gotta Hack That on Twitter @gotta_hack

yougottahackthat.com]]>
      </description>
      <content:encoded>
        <![CDATA[Felix takes a look at the security vulnerabilities behind household smart meters. 

Email Felix using helpme@yg.ht
Find You Gotta Hack That on Twitter @gotta_hack

yougottahackthat.com]]>
      </content:encoded>
      <pubDate>Thu, 26 Jan 2023 02:00:00 +0000</pubDate>
      <author>You Gotta Hack That</author>
      <enclosure url="https://media.transistor.fm/c2996cce/9ecf6197.mp3" length="8459699" type="audio/mpeg"/>
      <itunes:author>You Gotta Hack That</itunes:author>
      <itunes:duration>612</itunes:duration>
      <itunes:summary>Felix takes a look at the security vulnerabilities behind household smart meters. 

Email Felix using helpme@yg.ht
Find You Gotta Hack That on Twitter @gotta_hack

yougottahackthat.com</itunes:summary>
      <itunes:subtitle>Felix takes a look at the security vulnerabilities behind household smart meters. 

Email Felix using helpme@yg.ht
Find You Gotta Hack That on Twitter @gotta_hack

yougottahackthat.com</itunes:subtitle>
      <itunes:keywords>Internet of things, IoT, Operational Technology, OT, cyber security, hacking, testing, penetration testing, embedded security, industrial control systems, cyber security, cyber assurance, operational technology, OT security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Welcome to You Gotta Hack That</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Welcome to You Gotta Hack That</itunes:title>
      <itunes:episodeType>trailer</itunes:episodeType>
      <guid isPermaLink="false">d592a7a6-7e26-4438-a965-e39d36a2bedc</guid>
      <link>https://share.transistor.fm/s/d1554590</link>
      <description>
        <![CDATA[Welcome to You Gotta Hack That, a brand new show in which Felix takes a weekly look at Internet of Things (IoT) cyber security. Perfect for IoT project managers, developers, and those learning about penetration testing in this niche area. ]]>
      </description>
      <content:encoded>
        <![CDATA[Welcome to You Gotta Hack That, a brand new show in which Felix takes a weekly look at Internet of Things (IoT) cyber security. Perfect for IoT project managers, developers, and those learning about penetration testing in this niche area. ]]>
      </content:encoded>
      <pubDate>Fri, 20 Jan 2023 14:30:00 +0000</pubDate>
      <author>You Gotta Hack That</author>
      <enclosure url="https://media.transistor.fm/d1554590/68f83fe1.mp3" length="679183" type="audio/mpeg"/>
      <itunes:author>You Gotta Hack That</itunes:author>
      <itunes:duration>46</itunes:duration>
      <itunes:summary>Welcome to You Gotta Hack That, a brand new show in which Felix takes a weekly look at Internet of Things (IoT) cyber security. Perfect for IoT project managers, developers, and those learning about penetration testing in this niche area. </itunes:summary>
      <itunes:subtitle>Welcome to You Gotta Hack That, a brand new show in which Felix takes a weekly look at Internet of Things (IoT) cyber security. Perfect for IoT project managers, developers, and those learning about penetration testing in this niche area. </itunes:subtitle>
      <itunes:keywords>Internet of things, IoT, Operational Technology, OT, cyber security, hacking, testing, penetration testing, embedded security, industrial control systems, cyber security, cyber assurance, operational technology, OT security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
  </channel>
</rss>
