<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:psc="http://podlove.org/simple-chapters" xmlns:podcast="https://podcastindex.org/namespace/1.0"><channel><title><![CDATA[Initial Access]]></title><description><![CDATA[<p>Bishop Fox offensive security researchers, experts, and hackers take a real look at the latest cybersecurity news headlines and have a straight take on them. The goal is simple: do you actually need to care about this, or is it just another variation of the same fundamental security problems we've been dealing with for years?</p>]]></description><link>www.bishopfox.com</link><generator>Riverside.fm (https://riverside.com)</generator><lastBuildDate>Wed, 22 Apr 2026 19:14:37 GMT</lastBuildDate><atom:link href="https://api.riverside.com/hosting/4LYNkPjM.rss" rel="self" type="application/rss+xml"/><author><![CDATA[Bishop Fox]]></author><pubDate>Sun, 15 Mar 2026 04:45:39 GMT</pubDate><copyright><![CDATA[2026 Bishop Fox]]></copyright><language><![CDATA[en]]></language><ttl>60</ttl><category><![CDATA[Technology]]></category><itunes:author>Bishop Fox</itunes:author><itunes:summary>&lt;p&gt;Bishop Fox offensive security researchers, experts, and hackers take a real look at the latest cybersecurity news headlines and have a straight take on them. The goal is simple: do you actually need to care about this, or is it just another variation of the same fundamental security problems we&apos;ve been dealing with for years?&lt;/p&gt;</itunes:summary><itunes:type>episodic</itunes:type><itunes:owner><itunes:name>Bishop Fox</itunes:name><itunes:email>rchism@bishopfox.com</itunes:email></itunes:owner><itunes:explicit>no</itunes:explicit><itunes:category text="Technology"/><itunes:image href="https://hosting-media.riverside.com/media/podcasts/b0b68c73-43fe-4ee6-951c-b19ba0aef1a4/logos/27add705-6451-4a45-8815-eecab12e3941.png"/><item><title><![CDATA[Trusted Tools, Hijacked Sessions & Cheap Paths to Big Access]]></title><description><![CDATA[<p>In this Initial Access episode, we look at how attackers are reusing trust that is already in place, from hijacked sessions and malicious browser extensions to overlooked industrial systems infrastructure and tightly controlled AI capabilities.</p><p><br /></p>]]></description><guid isPermaLink="false">03688e06-0eb9-4e1d-9322-00810a9df4c5</guid><dc:creator><![CDATA[Bishop Fox]]></dc:creator><pubDate>Mon, 20 Apr 2026 20:30:11 GMT</pubDate><enclosure url="https://api.riverside.com/hosting-analytics/media/b70911428cfe90e08f1f89d8c549fc7d994b66ab29f5d0210b0d347f4dbd4446/eyJlcGlzb2RlSWQiOiIwMzY4OGUwNi0wZWI5LTRlMWQtOTMyMi0wMDgxMGE5ZGY0YzUiLCJwb2RjYXN0SWQiOiJiMGI2OGM3My00M2ZlLTRlZTYtOTUxYy1iMTliYTBhZWYxYTQiLCJhY2NvdW50SWQiOiI2OTBhNjJjYTg3MDUwZWEwYTYxYTY1ZjEiLCJwYXRoIjoibWVkaWEvY2xpcHMvNjllMjhkMTU0MzA3NDM2NzUxY2E5YWU0L3NlY3VyaXR5LWhlYWRsaW5lcy1jb21wb3Nlci0yMDI2LTQtMTdfXzIxLTQyLTEyLm1wMyJ9.mp3" length="45970433" type="audio/mpeg"/><podcast:transcript url="https://hosting-media.riverside.com/media/podcasts/b0b68c73-43fe-4ee6-951c-b19ba0aef1a4/episodes/03688e06-0eb9-4e1d-9322-00810a9df4c5/transcripts.txt" type="text/plain"/><itunes:summary>&lt;p&gt;In this Initial Access episode, we look at how attackers are reusing trust that is already in place, from hijacked sessions and malicious browser extensions to overlooked industrial systems infrastructure and tightly controlled AI capabilities.&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;</itunes:summary><itunes:explicit>yes</itunes:explicit><itunes:duration>00:31:55</itunes:duration><itunes:image href="https://hosting-media.riverside.com/media/podcasts/b0b68c73-43fe-4ee6-951c-b19ba0aef1a4/logos/27add705-6451-4a45-8815-eecab12e3941.png"/><itunes:season>1</itunes:season><itunes:episode>13</itunes:episode><itunes:title>Trusted Tools, Hijacked Sessions &amp; Cheap Paths to Big Access</itunes:title><itunes:episodeType>full</itunes:episodeType></item><item><title><![CDATA[Project Glasswing: AI Vulnerability Discovery & Exploit]]></title><description><![CDATA[<p>In this special episode, we break down Anthropic’s <a rel="noopener noreferrer nofollow" href="https://www.anthropic.com/glasswing" target="_blank">Project Glasswing</a> announcement and what it signals for the future of cybersecurity. At its core, Glasswing is a defensive initiative built around a new class of AI capability: models that can identify, exploit, and help remediate software vulnerabilities.</p><p></p><p>The conversation goes beyond the announcement to unpack what this actually means in practice: where the capability holds real weight, where it remains constrained, and how security leaders should be thinking about control, oversight, and risk as AI begins to meaningfully accelerate offensive security outcomes.</p><p></p><p><b>Key Takeaways:</b></p><p></p><p><b>Glasswing reflects a real inflection point in offensive capability</b></p><p>The discussion enforces that AI systems are now capable of performing meaningful vulnerability discovery and exploitation tasks. The significance isn’t just in finding bugs, but in doing so at scale and speed that begins to outpace traditional human-led approaches.</p><p></p><p><b>The core shift is compression of the attack lifecycle</b></p><p>A major theme from the conversation is how AI reduces the time between discovery and exploitation. What historically required time, expertise, and iteration can now be accelerated, which has direct implications for how quickly defenders need to detect and respond.</p><p></p><p><b>This is as much about attacker enablement as defender tooling</b></p><p>While Glasswing is positioned as a defensive effort, the underlying capability is inherently dual-use. The experts highlight that the same advancements enabling defenders will inevitably lower the barrier for attackers, making this a race to adapt rather than a one-sided advantage.</p><p></p><p><b>Control—not capability—is the real constraint today</b></p><p>The limitation isn’t what the AI can do, but how safely it can be deployed. The discussion emphasizes that governance, access restriction, and controlled usage are currently the primary mechanisms preventing misuse—not a lack of technical capability.</p><p></p><p><b>Human-in-the-loop remains a necessary safeguard</b></p><p>While the technology is advancing quickly, the experts stress that human oversight is still critical, particularly when validating findings, making remediation decisions, and preventing unintended consequences from automated actions. This is less about slowing AI down and more about ensuring reliability and accountability.</p><p></p><p><b>Security programs are not designed for this speed yet</b></p><p>Existing security processes (patching cycles, validation workflows, detection models) are not built for a world where vulnerabilities can be discovered and operationalized at machine speed. This creates a growing gap between attacker capability and defender readiness.</p><p></p><p><b>Validation and testing models need to evolve</b></p><p>The conversation highlights the need for more realistic testing approaches that account for AI-driven discovery and exploitation. Traditional assessments may not fully capture how these systems behave or how quickly weaknesses can be identified and chained together.</p><p></p><p><b>The long-term impact is an expanding and accelerating attack surface</b></p><p>As AI continues to improve in code understanding and system analysis, the number of exploitable paths, and the speed at which they can be uncovered, will increase. This isn’t a single breakthrough moment, but the start of a compounding effect on both offense and defense.</p>]]></description><guid isPermaLink="false">4a831f59-14c6-4706-be52-ed7ccad571a3</guid><dc:creator><![CDATA[Bishop Fox]]></dc:creator><pubDate>Mon, 13 Apr 2026 23:28:47 GMT</pubDate><enclosure url="https://api.riverside.com/hosting-analytics/media/99d27094b32572c425dd314fe9b42b1c476a2bd1b2a542362c70255301c5a54b/eyJlcGlzb2RlSWQiOiI0YTgzMWY1OS0xNGM2LTQ3MDYtYmU1Mi1lZDdjY2FkNTcxYTMiLCJwb2RjYXN0SWQiOiJiMGI2OGM3My00M2ZlLTRlZTYtOTUxYy1iMTliYTBhZWYxYTQiLCJhY2NvdW50SWQiOiI2OTBhNjJjYTg3MDUwZWEwYTYxYTY1ZjEiLCJwYXRoIjoibWVkaWEvY2xpcHMvNjlkZDJkM2U4OGUwOGE3MDQyNGZlODE3L3NlY3VyaXR5LWhlYWRsaW5lcy1jb21wb3Nlci0yMDI2LTQtMTNfXzE5LTUxLTU4Lm1wMyJ9.mp3" length="32562094" type="audio/mpeg"/><podcast:transcript url="https://hosting-media.riverside.com/media/podcasts/b0b68c73-43fe-4ee6-951c-b19ba0aef1a4/episodes/4a831f59-14c6-4706-be52-ed7ccad571a3/transcripts.txt" type="text/plain"/><itunes:summary>&lt;p&gt;In this special episode, we break down Anthropic’s &lt;a rel=&quot;noopener noreferrer nofollow&quot; href=&quot;https://www.anthropic.com/glasswing&quot; target=&quot;_blank&quot;&gt;Project Glasswing&lt;/a&gt; announcement and what it signals for the future of cybersecurity. At its core, Glasswing is a defensive initiative built around a new class of AI capability: models that can identify, exploit, and help remediate software vulnerabilities.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;The conversation goes beyond the announcement to unpack what this actually means in practice: where the capability holds real weight, where it remains constrained, and how security leaders should be thinking about control, oversight, and risk as AI begins to meaningfully accelerate offensive security outcomes.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;Key Takeaways:&lt;/b&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;Glasswing reflects a real inflection point in offensive capability&lt;/b&gt;&lt;/p&gt;&lt;p&gt;The discussion enforces that AI systems are now capable of performing meaningful vulnerability discovery and exploitation tasks. The significance isn’t just in finding bugs, but in doing so at scale and speed that begins to outpace traditional human-led approaches.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;The core shift is compression of the attack lifecycle&lt;/b&gt;&lt;/p&gt;&lt;p&gt;A major theme from the conversation is how AI reduces the time between discovery and exploitation. What historically required time, expertise, and iteration can now be accelerated, which has direct implications for how quickly defenders need to detect and respond.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;This is as much about attacker enablement as defender tooling&lt;/b&gt;&lt;/p&gt;&lt;p&gt;While Glasswing is positioned as a defensive effort, the underlying capability is inherently dual-use. The experts highlight that the same advancements enabling defenders will inevitably lower the barrier for attackers, making this a race to adapt rather than a one-sided advantage.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;Control—not capability—is the real constraint today&lt;/b&gt;&lt;/p&gt;&lt;p&gt;The limitation isn’t what the AI can do, but how safely it can be deployed. The discussion emphasizes that governance, access restriction, and controlled usage are currently the primary mechanisms preventing misuse—not a lack of technical capability.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;Human-in-the-loop remains a necessary safeguard&lt;/b&gt;&lt;/p&gt;&lt;p&gt;While the technology is advancing quickly, the experts stress that human oversight is still critical, particularly when validating findings, making remediation decisions, and preventing unintended consequences from automated actions. This is less about slowing AI down and more about ensuring reliability and accountability.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;Security programs are not designed for this speed yet&lt;/b&gt;&lt;/p&gt;&lt;p&gt;Existing security processes (patching cycles, validation workflows, detection models) are not built for a world where vulnerabilities can be discovered and operationalized at machine speed. This creates a growing gap between attacker capability and defender readiness.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;Validation and testing models need to evolve&lt;/b&gt;&lt;/p&gt;&lt;p&gt;The conversation highlights the need for more realistic testing approaches that account for AI-driven discovery and exploitation. Traditional assessments may not fully capture how these systems behave or how quickly weaknesses can be identified and chained together.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;b&gt;The long-term impact is an expanding and accelerating attack surface&lt;/b&gt;&lt;/p&gt;&lt;p&gt;As AI continues to improve in code understanding and system analysis, the number of exploitable paths, and the speed at which they can be uncovered, will increase. This isn’t a single breakthrough moment, but the start of a compounding effect on both offense and defense.&lt;/p&gt;</itunes:summary><itunes:explicit>yes</itunes:explicit><itunes:duration>00:22:37</itunes:duration><itunes:image href="https://hosting-media.riverside.com/media/podcasts/b0b68c73-43fe-4ee6-951c-b19ba0aef1a4/logos/27add705-6451-4a45-8815-eecab12e3941.png"/><itunes:season>1</itunes:season><itunes:episode>12</itunes:episode><itunes:title>Project Glasswing: AI Vulnerability Discovery &amp; Exploit</itunes:title><itunes:episodeType>bonus</itunes:episodeType></item><item><title><![CDATA[GitHub Malware, DNS Hijacking, Ransomware Speed & AI Exploits]]></title><description><![CDATA[<p>In this Initial Access podcast episode, we examine how trust, speed, and automation are reshaping initial access across software supply chains, network infrastructure, and AI systems. </p>]]></description><guid isPermaLink="false">dab5254c-f430-44b2-bc03-51c9b1147d74</guid><dc:creator><![CDATA[Bishop Fox]]></dc:creator><pubDate>Mon, 13 Apr 2026 18:27:25 GMT</pubDate><enclosure url="https://api.riverside.com/hosting-analytics/media/f82cf50ecded323d6295b94f1d13c7844989bf3dca64466feeecf3e86c551627/eyJlcGlzb2RlSWQiOiJkYWI1MjU0Yy1mNDMwLTQ0YjItYmMwMy01MWM5YjExNDdkNzQiLCJwb2RjYXN0SWQiOiJiMGI2OGM3My00M2ZlLTRlZTYtOTUxYy1iMTliYTBhZWYxYTQiLCJhY2NvdW50SWQiOiI2OTBhNjJjYTg3MDUwZWEwYTYxYTY1ZjEiLCJwYXRoIjoibWVkaWEvY2xpcHMvNjlkOTczNzc2ZWQ5ODlkZmJlZTEzMGU1L3NlY3VyaXR5LWhlYWRsaW5lcy1jb21wb3Nlci0yMDI2LTQtMTFfXzAtMi0zMS5tcDMifQ==.mp3" length="59101666" type="audio/mpeg"/><podcast:transcript url="https://hosting-media.riverside.com/media/podcasts/b0b68c73-43fe-4ee6-951c-b19ba0aef1a4/episodes/dab5254c-f430-44b2-bc03-51c9b1147d74/transcripts.txt" type="text/plain"/><itunes:summary>&lt;p&gt;In this Initial Access podcast episode, we examine how trust, speed, and automation are reshaping initial access across software supply chains, network infrastructure, and AI systems. &lt;/p&gt;</itunes:summary><itunes:explicit>yes</itunes:explicit><itunes:duration>00:41:02</itunes:duration><itunes:image href="https://hosting-media.riverside.com/media/podcasts/b0b68c73-43fe-4ee6-951c-b19ba0aef1a4/logos/27add705-6451-4a45-8815-eecab12e3941.png"/><itunes:season>1</itunes:season><itunes:episode>11</itunes:episode><itunes:title>GitHub Malware, DNS Hijacking, Ransomware Speed &amp; AI Exploits</itunes:title><itunes:episodeType>full</itunes:episodeType></item><item><title><![CDATA[Inherited Access, AI Permissions, Supply Chain Attacks & Edge Exposure]]></title><description><![CDATA[<p>In this Initial Access podcast episode, we examine how attackers are inheriting access through trusted systems, default permissions, and unpatchable infrastructure.</p>]]></description><guid isPermaLink="false">3e59f218-d03c-4ec8-9ad8-dd1ded8373ee</guid><dc:creator><![CDATA[Bishop Fox]]></dc:creator><pubDate>Tue, 07 Apr 2026 21:41:17 GMT</pubDate><enclosure url="https://api.riverside.com/hosting-analytics/media/e1d1d98c5ab11d6df2df0cb1534ef106b3adf5a88927b8a73fcf3065ec21601b/eyJlcGlzb2RlSWQiOiIzZTU5ZjIxOC1kMDNjLTRlYzgtOWFkOC1kZDFkZWQ4MzczZWUiLCJwb2RjYXN0SWQiOiJiMGI2OGM3My00M2ZlLTRlZTYtOTUxYy1iMTliYTBhZWYxYTQiLCJhY2NvdW50SWQiOiI2OTBhNjJjYTg3MDUwZWEwYTYxYTY1ZjEiLCJwYXRoIjoibWVkaWEvY2xpcHMvNjljZmRiNzk0OWVlODExZjM1YjY1OTY0L3NlY3VyaXR5LWhlYWRsaW5lcy1jb21wb3Nlci0yMDI2LTQtM19fMTctMjMtMzcubXAzIn0=.mp3" length="39749320" type="audio/mpeg"/><podcast:transcript url="https://hosting-media.riverside.com/media/podcasts/b0b68c73-43fe-4ee6-951c-b19ba0aef1a4/episodes/3e59f218-d03c-4ec8-9ad8-dd1ded8373ee/transcripts.txt" type="text/plain"/><itunes:summary>&lt;p&gt;In this Initial Access podcast episode, we examine how attackers are inheriting access through trusted systems, default permissions, and unpatchable infrastructure.&lt;/p&gt;</itunes:summary><itunes:explicit>yes</itunes:explicit><itunes:duration>00:27:36</itunes:duration><itunes:image href="https://hosting-media.riverside.com/media/podcasts/b0b68c73-43fe-4ee6-951c-b19ba0aef1a4/logos/27add705-6451-4a45-8815-eecab12e3941.png"/><itunes:season>1</itunes:season><itunes:episode>10</itunes:episode><itunes:title>Inherited Access, AI Permissions, Supply Chain Attacks &amp; Edge Exposure</itunes:title><itunes:episodeType>full</itunes:episodeType></item><item><title><![CDATA[Malvertising, Trusted Tools, Real-Time Attacks & Shrinking Windows]]></title><description><![CDATA[<p>In this Initial Access podcast episode, we examine how attackers are turning normal workflows and trusted systems into reliable paths for initial access as exploitation timelines continue to shrink. </p>]]></description><guid isPermaLink="false">14baa592-4f9f-4130-89b0-b33467b2ceb3</guid><dc:creator><![CDATA[Bishop Fox]]></dc:creator><pubDate>Tue, 31 Mar 2026 14:33:30 GMT</pubDate><enclosure url="https://api.riverside.com/hosting-analytics/media/5adc9692bacdb658488faa672e9387f95f1e9730c8271d56a1a8a2e165dedf0e/eyJlcGlzb2RlSWQiOiIxNGJhYTU5Mi00ZjlmLTQxMzAtODliMC1iMzM0NjdiMmNlYjMiLCJwb2RjYXN0SWQiOiJiMGI2OGM3My00M2ZlLTRlZTYtOTUxYy1iMTliYTBhZWYxYTQiLCJhY2NvdW50SWQiOiI2OTBhNjJjYTg3MDUwZWEwYTYxYTY1ZjEiLCJwYXRoIjoibWVkaWEvY2xpcHMvNjljNmRjMDM4NmQyMTU2ODhlNmRiMTRkL3NlY3VyaXR5LWhlYWRsaW5lcy1jb21wb3Nlci0yMDI2LTMtMjdfXzIwLTM1LTMxLm1wMyJ9.mp3" length="43236353" type="audio/mpeg"/><podcast:transcript url="https://hosting-media.riverside.com/media/podcasts/b0b68c73-43fe-4ee6-951c-b19ba0aef1a4/episodes/14baa592-4f9f-4130-89b0-b33467b2ceb3/transcripts.txt" type="text/plain"/><itunes:summary>&lt;p&gt;In this Initial Access podcast episode, we examine how attackers are turning normal workflows and trusted systems into reliable paths for initial access as exploitation timelines continue to shrink. &lt;/p&gt;</itunes:summary><itunes:explicit>yes</itunes:explicit><itunes:duration>00:30:01</itunes:duration><itunes:image href="https://hosting-media.riverside.com/media/podcasts/b0b68c73-43fe-4ee6-951c-b19ba0aef1a4/logos/27add705-6451-4a45-8815-eecab12e3941.png"/><itunes:season>1</itunes:season><itunes:episode>9</itunes:episode><itunes:title>Malvertising, Trusted Tools, Real-Time Attacks &amp; Shrinking Windows</itunes:title><itunes:episodeType>full</itunes:episodeType></item><item><title><![CDATA[Speed, Trust, and the Compromised Workbench]]></title><description><![CDATA[<p>In this Initial Access podcast episode, the team looks at several recent examples of that compression in action, from a supply chain compromise that led to AWS admin access, to malware spreading through GitHub, npm, and VS Code, to ClickFix lures that convince technical users to run malicious commands themselves.</p>]]></description><guid isPermaLink="false">846e795e-bdd7-432f-9034-31fccc3ba55e</guid><dc:creator><![CDATA[Bishop Fox]]></dc:creator><pubDate>Wed, 25 Mar 2026 18:44:18 GMT</pubDate><enclosure url="https://api.riverside.com/hosting-analytics/media/853470e6975ca8a1c752ed1f280df679b51985a9926a5dbc40a9392467a8eca6/eyJlcGlzb2RlSWQiOiI4NDZlNzk1ZS1iZGQ3LTQzMmYtOTAzNC0zMWZjY2MzYmE1NWUiLCJwb2RjYXN0SWQiOiJiMGI2OGM3My00M2ZlLTRlZTYtOTUxYy1iMTliYTBhZWYxYTQiLCJhY2NvdW50SWQiOiI2OTBhNjJjYTg3MDUwZWEwYTYxYTY1ZjEiLCJwYXRoIjoibWVkaWEvY2xpcHMvNjliZDk4NTBhNmNjNWNiZDc1NDI0MzdjL3NlY3VyaXR5LWhlYWRsaW5lcy1jb21wb3Nlci0yMDI2LTMtMjBfXzE5LTU2LTE2Lm1wMyJ9.mp3" length="51937010" type="audio/mpeg"/><podcast:transcript url="https://hosting-media.riverside.com/media/podcasts/b0b68c73-43fe-4ee6-951c-b19ba0aef1a4/episodes/846e795e-bdd7-432f-9034-31fccc3ba55e/transcripts.txt" type="text/plain"/><itunes:summary>&lt;p&gt;In this Initial Access podcast episode, the team looks at several recent examples of that compression in action, from a supply chain compromise that led to AWS admin access, to malware spreading through GitHub, npm, and VS Code, to ClickFix lures that convince technical users to run malicious commands themselves.&lt;/p&gt;</itunes:summary><itunes:explicit>no</itunes:explicit><itunes:duration>00:36:04</itunes:duration><itunes:image href="https://hosting-media.riverside.com/media/podcasts/b0b68c73-43fe-4ee6-951c-b19ba0aef1a4/logos/27add705-6451-4a45-8815-eecab12e3941.png"/><itunes:season>1</itunes:season><itunes:episode>8</itunes:episode><itunes:title>Speed, Trust, and the Compromised Workbench</itunes:title><itunes:episodeType>full</itunes:episodeType></item><item><title><![CDATA[Social Engineering, Phishing, Edge Device Exploits & AI-Assisted Attacks]]></title><description><![CDATA[<p>In this Initial Access episode, we examine how attackers are gaining initial access through social engineering, identity abuse, and vulnerable edge infrastructure. The team also discusses the rise of phishing-as-a-service platforms, leaked mobile exploit chains entering the criminal ecosystem, and how AI is accelerating reconnaissance and offensive tooling for both attackers and defenders.</p>]]></description><guid isPermaLink="false">e99061d4-fdbc-4f7d-bc6a-2fba4cbebd23</guid><dc:creator><![CDATA[Bishop Fox]]></dc:creator><pubDate>Sun, 15 Mar 2026 05:00:06 GMT</pubDate><enclosure url="https://api.riverside.com/hosting-analytics/media/50f6ea14744456b0af104c46c7f46e3a7f65a96ba6988ef9477937604b9b860c/eyJlcGlzb2RlSWQiOiJlOTkwNjFkNC1mZGJjLTRmN2QtYmM2YS0yZmJhNGNiZWJkMjMiLCJwb2RjYXN0SWQiOiJiMGI2OGM3My00M2ZlLTRlZTYtOTUxYy1iMTliYTBhZWYxYTQiLCJhY2NvdW50SWQiOiI2OTBhNjJjYTg3MDUwZWEwYTYxYTY1ZjEiLCJwYXRoIjoibWVkaWEvY2xpcHMvNjliNDk2ZDE2ZjVkY2FhNGE1NmNkOTFkL3NlY3VyaXR5LWhlYWRsaW5lcy1jb21wb3Nlci0yMDI2LTMtMTNfXzIzLTU5LTI5Lm1wMyJ9.mp3" length="53749490" type="audio/mpeg"/><podcast:transcript url="https://hosting-media.riverside.com/media/podcasts/b0b68c73-43fe-4ee6-951c-b19ba0aef1a4/episodes/e99061d4-fdbc-4f7d-bc6a-2fba4cbebd23/transcripts.txt" type="text/plain"/><itunes:summary>&lt;p&gt;In this Initial Access episode, we examine how attackers are gaining initial access through social engineering, identity abuse, and vulnerable edge infrastructure. The team also discusses the rise of phishing-as-a-service platforms, leaked mobile exploit chains entering the criminal ecosystem, and how AI is accelerating reconnaissance and offensive tooling for both attackers and defenders.&lt;/p&gt;</itunes:summary><itunes:explicit>no</itunes:explicit><itunes:duration>00:37:20</itunes:duration><itunes:image href="https://hosting-media.riverside.com/media/podcasts/b0b68c73-43fe-4ee6-951c-b19ba0aef1a4/logos/27add705-6451-4a45-8815-eecab12e3941.png"/><itunes:season>1</itunes:season><itunes:episode>7</itunes:episode><itunes:title>Social Engineering, Phishing, Edge Device Exploits &amp; AI-Assisted Attacks</itunes:title><itunes:episodeType>full</itunes:episodeType></item><item><title><![CDATA[AI Coding Agents, FortiGate Attacks, Surveillance & Identity Hacks]]></title><description><![CDATA[<p>In this Initial Access podcast episode, we cover AI coding agents operating inside developer environments, automated attack platforms accelerating exploitation cycles, long-lived connected devices exposing unexpected telemetry risks, and why identity systems remain the primary entry point for attackers.</p>]]></description><guid isPermaLink="false">c4ab53ef-e315-48fc-a64d-a85e4a527bfa</guid><dc:creator><![CDATA[Bishop Fox]]></dc:creator><pubDate>Sun, 15 Mar 2026 04:58:03 GMT</pubDate><enclosure url="https://api.riverside.com/hosting-analytics/media/13508a0ff28c2d121f3a1f7c51a412970bc302516ba966118eee5e2be58306bf/eyJlcGlzb2RlSWQiOiJjNGFiNTNlZi1lMzE1LTQ4ZmMtYTY0ZC1hODVlNGE1MjdiZmEiLCJwb2RjYXN0SWQiOiJiMGI2OGM3My00M2ZlLTRlZTYtOTUxYy1iMTliYTBhZWYxYTQiLCJhY2NvdW50SWQiOiI2OTBhNjJjYTg3MDUwZWEwYTYxYTY1ZjEiLCJwYXRoIjoibWVkaWEvY2xpcHMvNjlhYjJjNzZmMmVjOTBlMmViNjc1NjJmL3NlY3VyaXR5LWhlYWRsaW5lcy1jb21wb3Nlci0yMDI2LTMtNl9fMjAtMzUtMTgubXAzIn0=.mp3" length="40182534" type="audio/mpeg"/><podcast:transcript url="https://hosting-media.riverside.com/media/podcasts/b0b68c73-43fe-4ee6-951c-b19ba0aef1a4/episodes/c4ab53ef-e315-48fc-a64d-a85e4a527bfa/transcripts.txt" type="text/plain"/><itunes:summary>&lt;p&gt;In this Initial Access podcast episode, we cover AI coding agents operating inside developer environments, automated attack platforms accelerating exploitation cycles, long-lived connected devices exposing unexpected telemetry risks, and why identity systems remain the primary entry point for attackers.&lt;/p&gt;</itunes:summary><itunes:explicit>no</itunes:explicit><itunes:duration>00:27:54</itunes:duration><itunes:image href="https://hosting-media.riverside.com/media/podcasts/b0b68c73-43fe-4ee6-951c-b19ba0aef1a4/logos/27add705-6451-4a45-8815-eecab12e3941.png"/><itunes:season>1</itunes:season><itunes:episode>6</itunes:episode><itunes:title>AI Coding Agents, FortiGate Attacks, Surveillance &amp; Identity Hacks</itunes:title><itunes:episodeType>full</itunes:episodeType></item><item><title><![CDATA[Autonomous AI, Broken Guardrails, and Geopolitics]]></title><description><![CDATA[<p>In this Initial Access podcast episode, we cover autonomous vulnerability discovery, AI agents that ignore instructions, and why models are becoming strategic national assets.</p>]]></description><guid isPermaLink="false">9b6319f5-02cc-4599-8aca-daf3a8302130</guid><dc:creator><![CDATA[Bishop Fox]]></dc:creator><pubDate>Sun, 15 Mar 2026 04:57:13 GMT</pubDate><enclosure url="https://api.riverside.com/hosting-analytics/media/992c363b4e07a75fef2bbce075b655b8cab16a6c513a8e64c0828483a9af2729/eyJlcGlzb2RlSWQiOiI5YjYzMTlmNS0wMmNjLTQ1OTktOGFjYS1kYWYzYTgzMDIxMzAiLCJwb2RjYXN0SWQiOiJiMGI2OGM3My00M2ZlLTRlZTYtOTUxYy1iMTliYTBhZWYxYTQiLCJhY2NvdW50SWQiOiI2OTBhNjJjYTg3MDUwZWEwYTYxYTY1ZjEiLCJwYXRoIjoibWVkaWEvY2xpcHMvNjlhMWRmODBlN2M3Yzk1OTMwOWE2NGQ2L3NlY3VyaXR5LWhlYWRsaW5lcy1jb21wb3Nlci0yMDI2LTItMjdfXzE5LTE2LTMyLm1wMyJ9.mp3" length="28626172" type="audio/mpeg"/><podcast:transcript url="https://hosting-media.riverside.com/media/podcasts/b0b68c73-43fe-4ee6-951c-b19ba0aef1a4/episodes/9b6319f5-02cc-4599-8aca-daf3a8302130/transcripts.txt" type="text/plain"/><itunes:summary>&lt;p&gt;In this Initial Access podcast episode, we cover autonomous vulnerability discovery, AI agents that ignore instructions, and why models are becoming strategic national assets.&lt;/p&gt;</itunes:summary><itunes:explicit>no</itunes:explicit><itunes:duration>00:19:53</itunes:duration><itunes:image href="https://hosting-media.riverside.com/media/podcasts/b0b68c73-43fe-4ee6-951c-b19ba0aef1a4/logos/27add705-6451-4a45-8815-eecab12e3941.png"/><itunes:season>1</itunes:season><itunes:episode>5</itunes:episode><itunes:title>Autonomous AI, Broken Guardrails, and Geopolitics</itunes:title><itunes:episodeType>full</itunes:episodeType></item><item><title><![CDATA[SSO Phishing, Patching Failures, Exposed APIs]]></title><description><![CDATA[<p>In this Initial Access podcast episode, we cover SSO phishing, patching failures, exposed APIs, and zombie infrastructure remind us that basic security hygiene still decides the outcome.</p>]]></description><guid isPermaLink="false">14735c0a-0eb9-4032-b4b4-8976083480bf</guid><dc:creator><![CDATA[Bishop Fox]]></dc:creator><pubDate>Sun, 15 Mar 2026 04:56:15 GMT</pubDate><enclosure url="https://api.riverside.com/hosting-analytics/media/04e0a4775ef569bb052c9db492d7701288706cdeb76286cd9d85b934ca243ce5/eyJlcGlzb2RlSWQiOiIxNDczNWMwYS0wZWI5LTQwMzItYjRiNC04OTc2MDgzNDgwYmYiLCJwb2RjYXN0SWQiOiJiMGI2OGM3My00M2ZlLTRlZTYtOTUxYy1iMTliYTBhZWYxYTQiLCJhY2NvdW50SWQiOiI2OTBhNjJjYTg3MDUwZWEwYTYxYTY1ZjEiLCJwYXRoIjoibWVkaWEvY2xpcHMvNjk5OGJhODI1NWIwOWRkZjE5OTcwNmMyL3NlY3VyaXR5LWhlYWRsaW5lcy1jb21wb3Nlci0yMDI2LTItMjBfXzIwLTQ4LTE4Lm1wMyJ9.mp3" length="31653659" type="audio/mpeg"/><podcast:transcript url="https://hosting-media.riverside.com/media/podcasts/b0b68c73-43fe-4ee6-951c-b19ba0aef1a4/episodes/14735c0a-0eb9-4032-b4b4-8976083480bf/transcripts.txt" type="text/plain"/><itunes:summary>&lt;p&gt;In this Initial Access podcast episode, we cover SSO phishing, patching failures, exposed APIs, and zombie infrastructure remind us that basic security hygiene still decides the outcome.&lt;/p&gt;</itunes:summary><itunes:explicit>no</itunes:explicit><itunes:duration>00:21:59</itunes:duration><itunes:image href="https://hosting-media.riverside.com/media/podcasts/b0b68c73-43fe-4ee6-951c-b19ba0aef1a4/logos/27add705-6451-4a45-8815-eecab12e3941.png"/><itunes:season>1</itunes:season><itunes:episode>4</itunes:episode><itunes:title>SSO Phishing, Patching Failures, Exposed APIs</itunes:title><itunes:episodeType>full</itunes:episodeType></item><item><title><![CDATA[Deepfakes, Spyware Skits & LLMs for Hire]]></title><description><![CDATA[<p>In this Initial Access podcast episode, we cover prompt injection, a hijacked Outlook add-in, commoditized mobile spyware, AI executive deepfake scams, IT-to-OT pivoting, and nation-state use of commercial LLMs to accelerate exploitation.</p>]]></description><guid isPermaLink="false">57a31a12-b19c-4e1c-842d-4d0257ed3fff</guid><dc:creator><![CDATA[Bishop Fox]]></dc:creator><pubDate>Sun, 15 Mar 2026 04:55:10 GMT</pubDate><enclosure url="https://api.riverside.com/hosting-analytics/media/2b3131631b4672cca511f7aae878564e9985c9d304aea36b0bd9a8b26c9fde10/eyJlcGlzb2RlSWQiOiI1N2EzMWExMi1iMTljLTRlMWMtODQyZC00ZDAyNTdlZDNmZmYiLCJwb2RjYXN0SWQiOiJiMGI2OGM3My00M2ZlLTRlZTYtOTUxYy1iMTliYTBhZWYxYTQiLCJhY2NvdW50SWQiOiI2OTBhNjJjYTg3MDUwZWEwYTYxYTY1ZjEiLCJwYXRoIjoibWVkaWEvY2xpcHMvNjk4ZjdmYzVmNTU4Y2RhZGQwYWE3NjQwL3NlY3VyaXR5LWhlYWRsaW5lcy1jb21wb3Nlci0yMDI2LTItMTNfXzIwLTQ3LTE3Lm1wMyJ9.mp3" length="22781222" type="audio/mpeg"/><podcast:transcript url="https://hosting-media.riverside.com/media/podcasts/b0b68c73-43fe-4ee6-951c-b19ba0aef1a4/episodes/57a31a12-b19c-4e1c-842d-4d0257ed3fff/transcripts.txt" type="text/plain"/><itunes:summary>&lt;p&gt;In this Initial Access podcast episode, we cover prompt injection, a hijacked Outlook add-in, commoditized mobile spyware, AI executive deepfake scams, IT-to-OT pivoting, and nation-state use of commercial LLMs to accelerate exploitation.&lt;/p&gt;</itunes:summary><itunes:explicit>no</itunes:explicit><itunes:duration>00:15:49</itunes:duration><itunes:image href="https://hosting-media.riverside.com/media/podcasts/b0b68c73-43fe-4ee6-951c-b19ba0aef1a4/logos/27add705-6451-4a45-8815-eecab12e3941.png"/><itunes:season>1</itunes:season><itunes:episode>3</itunes:episode><itunes:title>Deepfakes, Spyware Skits &amp; LLMs for Hire</itunes:title><itunes:episodeType>full</itunes:episodeType></item><item><title><![CDATA[Software Policy Rollbacks, Insider Access Abuse, and AI Automation Risk]]></title><description><![CDATA[<p>In this Initial Access podcast episode, we cover the rollback of federal software security guidance, insider-driven access risks, ongoing state-sponsored espionage, and the security implications of giving AI tools deep control over infrastructure.</p>]]></description><guid isPermaLink="false">cd7ec4eb-511a-4381-9d85-a904fb4e190c</guid><dc:creator><![CDATA[Bishop Fox]]></dc:creator><pubDate>Sun, 15 Mar 2026 04:53:32 GMT</pubDate><enclosure url="https://api.riverside.com/hosting-analytics/media/5a36fce73f655226ccd4e6ab2ba0b41fc9ff47e3184f1016f7ebcb5cc5012a59/eyJlcGlzb2RlSWQiOiJjZDdlYzRlYi01MTFhLTQzODEtOWQ4NS1hOTA0ZmI0ZTE5MGMiLCJwb2RjYXN0SWQiOiJiMGI2OGM3My00M2ZlLTRlZTYtOTUxYy1iMTliYTBhZWYxYTQiLCJhY2NvdW50SWQiOiI2OTBhNjJjYTg3MDUwZWEwYTYxYTY1ZjEiLCJwYXRoIjoibWVkaWEvY2xpcHMvNjk4NjY5NTlkYjgxYWYzMmEzYmJkNjQ3L3NlY3VyaXR5LWhlYWRsaW5lcy1jb21wb3Nlci0yMDI2LTItNl9fMjMtMjEtMTMubXAzIn0=.mp3" length="22299733" type="audio/mpeg"/><podcast:transcript url="https://hosting-media.riverside.com/media/podcasts/b0b68c73-43fe-4ee6-951c-b19ba0aef1a4/episodes/cd7ec4eb-511a-4381-9d85-a904fb4e190c/transcripts.txt" type="text/plain"/><itunes:summary>&lt;p&gt;In this Initial Access podcast episode, we cover the rollback of federal software security guidance, insider-driven access risks, ongoing state-sponsored espionage, and the security implications of giving AI tools deep control over infrastructure.&lt;/p&gt;</itunes:summary><itunes:explicit>no</itunes:explicit><itunes:duration>00:15:29</itunes:duration><itunes:image href="https://hosting-media.riverside.com/media/podcasts/b0b68c73-43fe-4ee6-951c-b19ba0aef1a4/logos/27add705-6451-4a45-8815-eecab12e3941.png"/><itunes:season>1</itunes:season><itunes:episode>2</itunes:episode><itunes:title>Software Policy Rollbacks, Insider Access Abuse, and AI Automation Risk</itunes:title><itunes:episodeType>full</itunes:episodeType></item><item><title><![CDATA[Prompt Injection, Session Hijacking & Why AI Isn't Writing the Attack Plans Yet]]></title><description><![CDATA[<p>In this Initial Access podcast episode, we cover AI prompt injection risks, continued social engineering via LinkedIn and QR codes, credential theft and session hijacking, patch reliability and appliance security, and how AI is being used to accelerate malware development, distinguishing meaningful risk from overhyped claims.</p>]]></description><guid isPermaLink="false">69d48004-9bac-44ff-9616-0075204ff3d2</guid><dc:creator><![CDATA[Bishop Fox]]></dc:creator><pubDate>Sun, 15 Mar 2026 04:47:57 GMT</pubDate><enclosure url="https://api.riverside.com/hosting-analytics/media/a3f3970634580a233545a4cf196e2d0fe8e53ef58ae54c601c05114fefd01110/eyJlcGlzb2RlSWQiOiI2OWQ0ODAwNC05YmFjLTQ0ZmYtOTYxNi0wMDc1MjA0ZmYzZDIiLCJwb2RjYXN0SWQiOiJiMGI2OGM3My00M2ZlLTRlZTYtOTUxYy1iMTliYTBhZWYxYTQiLCJhY2NvdW50SWQiOiI2OTBhNjJjYTg3MDUwZWEwYTYxYTY1ZjEiLCJwYXRoIjoibWVkaWEvY2xpcHMvNjk3NDAxNzFhYjZmM2U0YTFkN2Y5NjdjL3NlY3VyaXR5LWhlYWRsaW5lcy1jb21wb3Nlci0yMDI2LTEtMjRfXzAtMTctNS5tcDMifQ==.mp3" length="28776010" type="audio/mpeg"/><podcast:transcript url="https://hosting-media.riverside.com/media/podcasts/b0b68c73-43fe-4ee6-951c-b19ba0aef1a4/episodes/69d48004-9bac-44ff-9616-0075204ff3d2/transcripts.txt" type="text/plain"/><itunes:summary>&lt;p&gt;In this Initial Access podcast episode, we cover AI prompt injection risks, continued social engineering via LinkedIn and QR codes, credential theft and session hijacking, patch reliability and appliance security, and how AI is being used to accelerate malware development, distinguishing meaningful risk from overhyped claims.&lt;/p&gt;</itunes:summary><itunes:explicit>no</itunes:explicit><itunes:duration>00:19:59</itunes:duration><itunes:image href="https://hosting-media.riverside.com/media/podcasts/b0b68c73-43fe-4ee6-951c-b19ba0aef1a4/logos/27add705-6451-4a45-8815-eecab12e3941.png"/><itunes:season>1</itunes:season><itunes:episode>1</itunes:episode><itunes:title>Prompt Injection, Session Hijacking &amp; Why AI Isn&apos;t Writing the Attack Plans Yet</itunes:title><itunes:episodeType>full</itunes:episodeType></item></channel></rss>