<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://redacted.au/wp-content/plugins/seriously-simple-podcasting/templates/feed-stylesheet.xsl"?><rss version="2.0"
	 xmlns:content="http://purl.org/rss/1.0/modules/content/"
	 xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	 xmlns:dc="http://purl.org/dc/elements/1.1/"
	 xmlns:atom="http://www.w3.org/2005/Atom"
	 xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	 xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	 xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd"
	 xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"
	 xmlns:podcast="https://podcastindex.org/namespace/1.0"
	>
		<channel>
		<title>The Red Room</title>
		<atom:link href="https://redacted.au/feed/podcast/the-red-room/" rel="self" type="application/rss+xml"/>
		<link>https://redacted.au/podcasts/the-red-room/</link>
		<description>The show where red team stories from around the world are explored by the guys at Redacted Information Security, and new techniques and tools are pulled apart and discussed.</description>
		<lastBuildDate>Tue, 06 Jan 2026 04:17:19 +0000</lastBuildDate>
		<language>en-AU</language>
		<copyright>© 2024 Redacted Information Security</copyright>
		<itunes:subtitle>Red Team stories from Redacted</itunes:subtitle>
		<itunes:author>Redacted Information Security</itunes:author>
		<itunes:type>episodic</itunes:type>
		<itunes:summary>The show where red team stories from around the world are explored by the guys at Redacted Information Security, and new techniques and tools are pulled apart and discussed.</itunes:summary>
		<itunes:owner>
			<itunes:name>Redacted Information Security</itunes:name>
			<itunes:email>production@kbi.media</itunes:email>
		</itunes:owner>
		<itunes:explicit>true</itunes:explicit>
		<itunes:image href="https://redacted.au/wp-content/uploads/2024/08/The-Red-Room-Podcast.png"></itunes:image>
			<image>
				<url>https://redacted.au/wp-content/uploads/2024/08/The-Red-Room-Podcast.png</url>
				<title>The Red Room</title>
				<link>https://redacted.au/podcasts/the-red-room/</link>
			</image>
		<itunes:category text="Technology">
		</itunes:category>
		<googleplay:author><![CDATA[Redacted Information Security]]></googleplay:author>
			<googleplay:email>production@kbi.media</googleplay:email>			<googleplay:description>The show where red team stories from around the world are explored by the guys at Redacted Information Security, and new techniques and tools are pulled apart and discussed.</googleplay:description>
			<googleplay:explicit>Yes</googleplay:explicit>
			<googleplay:image href="https://redacted.au/wp-content/uploads/2024/08/The-Red-Room-Podcast.png"></googleplay:image>
			<podcast:locked owner="production@kbi.media">yes</podcast:locked>
		<podcast:guid>3a338067-53a0-574c-8d8d-8e8898de082b</podcast:guid>
		
		<!-- podcast_generator="SSP by Castos/3.15.0" Seriously Simple Podcasting plugin for WordPress (https://wordpress.org/plugins/seriously-simple-podcasting/) -->
		<generator>https://wordpress.org/?v=6.9.4</generator>

<item>
	<title>Episode 5 – AI-AI-Oh&#8230;</title>
	<link>https://redacted.au/podcast/episode-5-ai-ai-oh/</link>
	<pubDate>Thu, 24 Jul 2025 13:51:36 +0000</pubDate>
	<dc:creator><![CDATA[Redacted Information Security]]></dc:creator>
	<guid isPermaLink="false">https://redacted.au/?post_type=podcast&#038;p=4347</guid>
	<description><![CDATA[<p data-start="284" data-end="670">In this expansive and irreverent episode, Remy and Simon welcome Miranda from Malware Security to dissect the latest evolutions in phishing and AI red teaming. From the ethics of supply chain rootkits in gaming software to GPT hallucinations hijacking repo names, the team explores the shifting definitions of what constitutes a phishing attack in the age of AI.</p>
<p data-start="672" data-end="917">Miranda stays on for all three segments: a speculative discussion on “alt-phishing,” an in-depth interview on offensive AI security, and a final review of some standout AI red team tooling, including Microsoft’s new open-source platform “PyRIT.”</p>]]></description>
	<itunes:subtitle><![CDATA[In this expansive and irreverent episode, Remy and Simon welcome Miranda from Malware Security to dissect the latest evolutions in phishing and AI red teaming. From the ethics of supply chain rootkits in gaming software to GPT hallucinations hijacking re]]></itunes:subtitle>
	<itunes:episodeType>full</itunes:episodeType>
	<itunes:title><![CDATA[AI-AI-Oh...]]></itunes:title>
	<itunes:episode>5</itunes:episode>
	<itunes:season>1</itunes:season>
	<content:encoded><![CDATA[<p data-start="284" data-end="670">In this expansive and irreverent episode, Remy and Simon welcome Miranda from Malware Security to dissect the latest evolutions in phishing and AI red teaming. From the ethics of supply chain rootkits in gaming software to GPT hallucinations hijacking repo names, the team explores the shifting definitions of what constitutes a phishing attack in the age of AI.</p>
<p data-start="672" data-end="917">Miranda stays on for all three segments: a speculative discussion on “alt-phishing,” an in-depth interview on offensive AI security, and a final review of some standout AI red team tooling, including Microsoft’s new open-source platform “PyRIT.”</p>]]></content:encoded>
	<enclosure url="https://episodes.castos.com/kbkast/2096653/c1e-pjr0h1wj4dumo9x0-pkxx3pxkb80m-vk0rju.mp3" length="70256474" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[In this expansive and irreverent episode, Remy and Simon welcome Miranda from Malware Security to dissect the latest evolutions in phishing and AI red teaming. From the ethics of supply chain rootkits in gaming software to GPT hallucinations hijacking repo names, the team explores the shifting definitions of what constitutes a phishing attack in the age of AI.
Miranda stays on for all three segments: a speculative discussion on “alt-phishing,” an in-depth interview on offensive AI security, and a final review of some standout AI red team tooling, including Microsoft’s new open-source platform “PyRIT.”]]></itunes:summary>
	<itunes:image href="https://redacted.au/wp-content/uploads/2025/07/Miranda.png"></itunes:image>
	<image>
		<url>https://redacted.au/wp-content/uploads/2025/07/Miranda.png</url>
		<title>Episode 5 – AI-AI-Oh&#8230;</title>
	</image>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>01:13:12</itunes:duration>
	<itunes:author><![CDATA[Redacted Information Security]]></itunes:author>	<googleplay:description><![CDATA[In this expansive and irreverent episode, Remy and Simon welcome Miranda from Malware Security to dissect the latest evolutions in phishing and AI red teaming. From the ethics of supply chain rootkits in gaming software to GPT hallucinations hijacking repo names, the team explores the shifting definitions of what constitutes a phishing attack in the age of AI.
Miranda stays on for all three segments: a speculative discussion on “alt-phishing,” an in-depth interview on offensive AI security, and a final review of some standout AI red team tooling, including Microsoft’s new open-source platform “PyRIT.”]]></googleplay:description>
	<googleplay:image href="https://redacted.au/wp-content/uploads/2025/07/Miranda.png"></googleplay:image>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>Episode 4 – Our BSides A-game</title>
	<link>https://redacted.au/podcast/episode-4-our-bsides-a-game/</link>
	<pubDate>Sun, 03 Nov 2024 03:52:30 +0000</pubDate>
	<dc:creator><![CDATA[Redacted Information Security]]></dc:creator>
	<guid isPermaLink="false">https://redacted.au/?post_type=podcast&#038;p=4312</guid>
	<description><![CDATA[<p>The Redacted team are back for another episode, and this week we&#8217;re exploring malware, the PowerShell module, and we break down obfuscation as a goal and a process.</p>
<p>We also recently attended the BSides conference at the end of September and met with some amazing people. We managed to record some of our conversations, and present them here in all their glory. Enjoy!</p>]]></description>
	<itunes:subtitle><![CDATA[The Redacted team are back for another episode, and this week we&#8217;re exploring malware, the PowerShell module, and we break down obfuscation as a goal and a process.
We also recently attended the BSides conference at the end of September and met wit]]></itunes:subtitle>
	<itunes:episodeType>full</itunes:episodeType>
	<itunes:episode>4</itunes:episode>
	<itunes:season>1</itunes:season>
	<content:encoded><![CDATA[<p>The Redacted team are back for another episode, and this week we&#8217;re exploring malware, the PowerShell module, and we break down obfuscation as a goal and a process.</p>
<p>We also recently attended the BSides conference at the end of September and met with some amazing people. We managed to record some of our conversations, and present them here in all their glory. Enjoy!</p>]]></content:encoded>
	<enclosure url="https://episodes.castos.com/kbkast/1873013/c1e-89g7f92p49t1d8wj-wwmn897qcpj0-2eup4k.mp3" length="50657114" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[The Redacted team are back for another episode, and this week we&#8217;re exploring malware, the PowerShell module, and we break down obfuscation as a goal and a process.
We also recently attended the BSides conference at the end of September and met with some amazing people. We managed to record some of our conversations, and present them here in all their glory. Enjoy!]]></itunes:summary>
	<itunes:image href="https://redacted.au/wp-content/uploads/2024/11/BSides-Cover.png"></itunes:image>
	<image>
		<url>https://redacted.au/wp-content/uploads/2024/11/BSides-Cover.png</url>
		<title>Episode 4 – Our BSides A-game</title>
	</image>
	<itunes:explicit>false</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>00:52:47</itunes:duration>
	<itunes:author><![CDATA[Redacted Information Security]]></itunes:author>	<googleplay:description><![CDATA[The Redacted team are back for another episode, and this week we&#8217;re exploring malware, the PowerShell module, and we break down obfuscation as a goal and a process.
We also recently attended the BSides conference at the end of September and met with some amazing people. We managed to record some of our conversations, and present them here in all their glory. Enjoy!]]></googleplay:description>
	<googleplay:image href="https://redacted.au/wp-content/uploads/2024/11/BSides-Cover.png"></googleplay:image>
	<googleplay:explicit>No</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>Episode 3 – Artificial Red No.3</title>
	<link>https://redacted.au/podcast/episode-3-artificial-red-no-3/</link>
	<pubDate>Thu, 26 Sep 2024 22:51:52 +0000</pubDate>
	<dc:creator><![CDATA[Redacted Information Security]]></dc:creator>
	<guid isPermaLink="false">https://redacted.au/?post_type=podcast&#038;p=4233</guid>
	<description><![CDATA[<p>Matthew is a principal security consultant within the Proactive Labs team, with over 15 years&#8217; experience in the Information Technology industry, and with 10 years&#8217; in offensive security.</p>
<p>As a penetration tester, Matthew has extensive experience in both private and public sectors, performing technical security assessments, and penetrating large, complex organisation systems with demonstrated impact against high-profile targets. Matthew enjoys performing realistic security assessments, identifying root cause issues of technical problems, and explaining them to every level of audience.</p>
<p>We also chat about whether or not AI will ever get good at red teaming and hacking, and then review the popular tool Responder.</p>]]></description>
	<itunes:subtitle><![CDATA[Matthew is a principal security consultant within the Proactive Labs team, with over 15 years&#8217; experience in the Information Technology industry, and with 10 years&#8217; in offensive security.
As a penetration tester, Matthew has extensive experie]]></itunes:subtitle>
	<content:encoded><![CDATA[<p>Matthew is a principal security consultant within the Proactive Labs team, with over 15 years&#8217; experience in the Information Technology industry, and with 10 years&#8217; in offensive security.</p>
<p>As a penetration tester, Matthew has extensive experience in both private and public sectors, performing technical security assessments, and penetrating large, complex organisation systems with demonstrated impact against high-profile targets. Matthew enjoys performing realistic security assessments, identifying root cause issues of technical problems, and explaining them to every level of audience.</p>
<p>We also chat about whether or not AI will ever get good at red teaming and hacking, and then review the popular tool Responder.</p>]]></content:encoded>
	<enclosure url="https://episodes.castos.com/kbkast/1835214/c1e-z9w7fmx657uokrwj-25d69xrou8ow-doesb1.mp3" length="64824676" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[Matthew is a principal security consultant within the Proactive Labs team, with over 15 years&#8217; experience in the Information Technology industry, and with 10 years&#8217; in offensive security.
As a penetration tester, Matthew has extensive experience in both private and public sectors, performing technical security assessments, and penetrating large, complex organisation systems with demonstrated impact against high-profile targets. Matthew enjoys performing realistic security assessments, identifying root cause issues of technical problems, and explaining them to every level of audience.
We also chat about whether or not AI will ever get good at red teaming and hacking, and then review the popular tool Responder.]]></itunes:summary>
	<itunes:image href="https://redacted.au/wp-content/uploads/2024/09/Matt.png"></itunes:image>
	<image>
		<url>https://redacted.au/wp-content/uploads/2024/09/Matt.png</url>
		<title>Episode 3 – Artificial Red No.3</title>
	</image>
	<itunes:explicit>true</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>01:07:32</itunes:duration>
	<itunes:author><![CDATA[Redacted Information Security]]></itunes:author>	<googleplay:description><![CDATA[Matthew is a principal security consultant within the Proactive Labs team, with over 15 years&#8217; experience in the Information Technology industry, and with 10 years&#8217; in offensive security.
As a penetration tester, Matthew has extensive experience in both private and public sectors, performing technical security assessments, and penetrating large, complex organisation systems with demonstrated impact against high-profile targets. Matthew enjoys performing realistic security assessments, identifying root cause issues of technical problems, and explaining them to every level of audience.
We also chat about whether or not AI will ever get good at red teaming and hacking, and then review the popular tool Responder.]]></googleplay:description>
	<googleplay:image href="https://redacted.au/wp-content/uploads/2024/09/Matt.png"></googleplay:image>
	<googleplay:explicit>Yes</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>Episode 2 – On Ground at DEF CON 32</title>
	<link>https://redacted.au/podcast/episode-2-on-ground-at-def-con-32/</link>
	<pubDate>Mon, 16 Sep 2024 04:48:30 +0000</pubDate>
	<dc:creator><![CDATA[Redacted Information Security]]></dc:creator>
	<guid isPermaLink="false">https://redacted.au/?post_type=podcast&#038;p=4229</guid>
	<description><![CDATA[<p>Remy &amp; Simon sat down with a whole host of people at the DEF CON 32 Hacking Conference to find out what they&#8217;re doing there, and the unique projects and products they&#8217;re developing.</p>
<p>On ground at the Las Vegas Convention Center, unsurprisingly in Las Vegas, Nevada, the Redacted founders met, in no particular order, with:</p>
<p>1. Aerospace – Spanky (<a href="https://www.aerospacevillage.org/" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://www.aerospacevillage.org/&amp;source=gmail&amp;ust=1726294624335000&amp;usg=AOvVaw0K9_UBhUOtM715ZexFxP-c">https://www.aerospacevillage.org/</a>)
2. Biohacking – Nina (<a href="https://www.villageb.io/" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://www.villageb.io/&amp;source=gmail&amp;ust=1726294624335000&amp;usg=AOvVaw0ks6gr6Z4ubikL_wf7KM1F">https://www.villageb.io/</a>)
3. Blue Team Game – Amy (<a href="https://www.cygence.com.au/about" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://www.cygence.com.au/about&amp;source=gmail&amp;ust=1726294624335000&amp;usg=AOvVaw0iSRHw1Qj83LtbcNwz-ANx">https://www.cygence.com.au/about</a>)
4. Car Hacking – Ben (<a href="https://www.carhackingvillage.com/" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://www.carhackingvillage.com/&amp;source=gmail&amp;ust=1726294624335000&amp;usg=AOvVaw0QFIzuTGKdhZIZiyCGzNwO">https://www.carhackingvillage.com/</a>)
5. ES 1 &#8211; Ben (<a href="https://embeddedvillage.org/" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://embeddedvillage.org/&amp;source=gmail&amp;ust=1726294624335000&amp;usg=AOvVaw1eW8Sgn-etHSWpEVbMXu3M">https://embeddedvillage.org/</a>)
6. ES 2 &#8211; Tivo (<a href="https://embeddedvillage.org/" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://embeddedvillage.org/&amp;source=gmail&amp;ust=1726294624335000&amp;usg=AOvVaw1eW8Sgn-etHSWpEVbMXu3M">https://embeddedvillage.org/</a>)
7. ES 3 – Thomas (<a href="https://www.linkedin.com/in/stacksmashing/" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://www.linkedin.com/in/stacksmashing/&amp;source=gmail&amp;ust=1726294624335000&amp;usg=AOvVaw3wI54_-7DARBOedyXG_954">https://www.linkedin.com/in/stacksmashing/</a>) and he talks about hextree (<a href="https://www.hextree.io/" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://www.hextree.io/&amp;source=gmail&amp;ust=1726294624335000&amp;usg=AOvVaw1LWeWH4L6yOCRov_gRtmTp">https://www.hextree.io/</a>)
8. Game Hackers – Julian (<a href="https://gamehacking.gg/" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://gamehacking.gg/&amp;source=gmail&amp;ust=1726294624335000&amp;usg=AOvVaw0ks2NIBiqpp-rXMcCpF21P">https://gamehacking.gg/</a>)
9. IoT – Ben (<a href="https://iotvillage.org/index.html" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://iotvillage.org/index.html&amp;source=gmail&amp;ust=1726294624335000&amp;usg=AOvVaw2o_XGpEkxNjxiiHg3WL24A">https://iotvillage.org/index.html</a>)
10. RF – ZeroChaos and Wasabi (<a href="https://rfhackers.com/" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://rfhackers.com/&amp;source=gmail&amp;ust=1726294624335000&amp;usg=AOvVaw3giBgEpKS5habWKpN4DshA">https://rfhackers.com/</a>)
11. Tamper Evident – Morfir (<a href="https://forum.defcon.org/node/14513?t=13456">https://forum.defcon.org/node/14513?t=13456</a>)
12. Tryhackme – Ashu (<a href="https://tryhackme.com/" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://tryhackme.com/&amp;source=gmail&amp;ust=1726294624335000&amp;usg=AOvVaw1tDlxZWbt3VEQKks4uITig">https://tryhackme.com/</a>) (<a href="https://www.linkedin.com/in/ashu-savani/" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://www.linkedin.com/in/ashu-savani/&amp;source=gmail&amp;ust=1726294624335000&amp;usg=AOvVaw0mG-aLW8SRAsrKncHORuCY">https://www.linkedin.com/in/ashu-savani/</a>)
13. Voting – Harri (<a href="https://www.votingvillage.org/about" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://www.votingvillage.org/about&amp;source=gmail&amp;ust=1726294624335000&amp;usg=AOvVaw1HQj-D9j-iNFRv2Y9_e3Zm">https://www.votingvillage.org/about</a>)
14. XR village – Starr (<a href="https://www.xrvillage.org/" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://www.xrvillage.org/&amp;source=gmail&amp;ust=1726294624335000&amp;usg=AOvVaw35fNov0LMtv71o8XW2IkpN">https://www.xrvillage.org/</a>)</p>]]></description>
	<itunes:subtitle><![CDATA[Remy &amp; Simon sat down with a whole host of people at the DEF CON 32 Hacking Conference to find out what they&#8217;re doing there, and the unique projects and products they&#8217;re developing.
On ground at the Las Vegas Convention Center, unsurprisi]]></itunes:subtitle>
	<content:encoded><![CDATA[<p>Remy &amp; Simon sat down with a whole host of people at the DEF CON 32 Hacking Conference to find out what they&#8217;re doing there, and the unique projects and products they&#8217;re developing.</p>
<p>On ground at the Las Vegas Convention Center, unsurprisingly in Las Vegas, Nevada, the Redacted founders met, in no particular order, with:</p>
<p>1. Aerospace – Spanky (<a href="https://www.aerospacevillage.org/" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://www.aerospacevillage.org/&amp;source=gmail&amp;ust=1726294624335000&amp;usg=AOvVaw0K9_UBhUOtM715ZexFxP-c">https://www.aerospacevillage.org/</a>)
2. Biohacking – Nina (<a href="https://www.villageb.io/" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://www.villageb.io/&amp;source=gmail&amp;ust=1726294624335000&amp;usg=AOvVaw0ks6gr6Z4ubikL_wf7KM1F">https://www.villageb.io/</a>)
3. Blue Team Game – Amy (<a href="https://www.cygence.com.au/about" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://www.cygence.com.au/about&amp;source=gmail&amp;ust=1726294624335000&amp;usg=AOvVaw0iSRHw1Qj83LtbcNwz-ANx">https://www.cygence.com.au/about</a>)
4. Car Hacking – Ben (<a href="https://www.carhackingvillage.com/" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://www.carhackingvillage.com/&amp;source=gmail&amp;ust=1726294624335000&amp;usg=AOvVaw0QFIzuTGKdhZIZiyCGzNwO">https://www.carhackingvillage.com/</a>)
5. ES 1 &#8211; Ben (<a href="https://embeddedvillage.org/" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://embeddedvillage.org/&amp;source=gmail&amp;ust=1726294624335000&amp;usg=AOvVaw1eW8Sgn-etHSWpEVbMXu3M">https://embeddedvillage.org/</a>)
6. ES 2 &#8211; Tivo (<a href="https://embeddedvillage.org/" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://embeddedvillage.org/&amp;source=gmail&amp;ust=1726294624335000&amp;usg=AOvVaw1eW8Sgn-etHSWpEVbMXu3M">https://embeddedvillage.org/</a>)
7. ES 3 – Thomas (<a href="https://www.linkedin.com/in/stacksmashing/" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://www.linkedin.com/in/stacksmashing/&amp;source=gmail&amp;ust=1726294624335000&amp;usg=AOvVaw3wI54_-7DARBOedyXG_954">https://www.linkedin.com/in/stacksmashing/</a>) and he talks about hextree (<a href="https://www.hextree.io/" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://www.hextree.io/&amp;source=gmail&amp;ust=1726294624335000&amp;usg=AOvVaw1LWeWH4L6yOCRov_gRtmTp">https://www.hextree.io/</a>)
8. Game Hackers – Julian (<a href="https://gamehacking.gg/" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://gamehacking.gg/&amp;source=gmail&amp;ust=1726294624335000&amp;usg=AOvVaw0ks2NIBiqpp-rXMcCpF21P">https://gamehacking.gg/</a>)
9. IoT – Ben (<a href="https://iotvillage.org/index.html" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://iotvillage.org/index.html&amp;source=gmail&amp;ust=1726294624335000&amp;usg=AOvVaw2o_XGpEkxNjxiiHg3WL24A">https://iotvillage.org/index.html</a>)
10. RF – ZeroChaos and Wasabi (<a href="https://rfhackers.com/" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://rfhackers.com/&amp;source=gmail&amp;ust=1726294624335000&amp;usg=AOvVaw3giBgEpKS5habWKpN4DshA">https://rfhackers.com/</a>)
11. Tamper Evident – Morfir (<a href="https://forum.defcon.org/node/14513?t=13456">https://forum.defcon.org/node/14513?t=13456</a>)
12. Tryhackme – Ashu (<a href="https://tryhackme.com/" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://tryhackme.com/&amp;source=gmail&amp;ust=1726294624335000&amp;usg=AOvVaw1tDlxZWbt3VEQKks4uITig">https://tryhackme.com/</a>) (<a href="https://www.linkedin.com/in/ashu-savani/" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://www.linkedin.com/in/ashu-savani/&amp;source=gmail&amp;ust=1726294624335000&amp;usg=AOvVaw0mG-aLW8SRAsrKncHORuCY">https://www.linkedin.com/in/ashu-savani/</a>)
13. Voting – Harri (<a href="https://www.votingvillage.org/about" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://www.votingvillage.org/about&amp;source=gmail&amp;ust=1726294624335000&amp;usg=AOvVaw1HQj-D9j-iNFRv2Y9_e3Zm">https://www.votingvillage.org/about</a>)
14. XR village – Starr (<a href="https://www.xrvillage.org/" target="_blank" rel="noopener" data-saferedirecturl="https://www.google.com/url?q=https://www.xrvillage.org/&amp;source=gmail&amp;ust=1726294624335000&amp;usg=AOvVaw35fNov0LMtv71o8XW2IkpN">https://www.xrvillage.org/</a>)</p>]]></content:encoded>
	<enclosure url="https://episodes.castos.com/kbkast/1835219/c1e-7km5b4712wcd6vxo-dm6o0g68uk9q-tj7moo.mp3" length="133967664" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[Remy &amp; Simon sat down with a whole host of people at the DEF CON 32 Hacking Conference to find out what they&#8217;re doing there, and the unique projects and products they&#8217;re developing.
On ground at the Las Vegas Convention Center, unsurprisingly in Las Vegas, Nevada, the Redacted founders met, in no particular order, with:
1. Aerospace – Spanky (https://www.aerospacevillage.org/)
2. Biohacking – Nina (https://www.villageb.io/)
3. Blue Team Game – Amy (https://www.cygence.com.au/about)
4. Car Hacking – Ben (https://www.carhackingvillage.com/)
5. ES 1 &#8211; Ben (https://embeddedvillage.org/)
6. ES 2 &#8211; Tivo (https://embeddedvillage.org/)
7. ES 3 – Thomas (https://www.linkedin.com/in/stacksmashing/) and he talks about hextree (https://www.hextree.io/)
8. Game Hackers – Julian (https://gamehacking.gg/)
9. IoT – Ben (https://iotvillage.org/index.html)
10. RF – ZeroChaos and Wasabi (https://rfhackers.com/)
11. Tamper Evident – Morfir (https://forum.defcon.org/node/14513?t=13456)
12. Tryhackme – Ashu (https://tryhackme.com/) (https://www.linkedin.com/in/ashu-savani/)
13. Voting – Harri (https://www.votingvillage.org/about)
14. XR village – Starr (https://www.xrvillage.org/)]]></itunes:summary>
	<itunes:image href="https://redacted.au/wp-content/uploads/2024/09/DEFCON-Redacted.jpg"></itunes:image>
	<image>
		<url>https://redacted.au/wp-content/uploads/2024/09/DEFCON-Redacted.jpg</url>
		<title>Episode 2 – On Ground at DEF CON 32</title>
	</image>
	<itunes:explicit>true</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>02:19:33</itunes:duration>
	<itunes:author><![CDATA[Redacted Information Security]]></itunes:author>	<googleplay:description><![CDATA[Remy &amp; Simon sat down with a whole host of people at the DEF CON 32 Hacking Conference to find out what they&#8217;re doing there, and the unique projects and products they&#8217;re developing.
On ground at the Las Vegas Convention Center, unsurprisingly in Las Vegas, Nevada, the Redacted founders met, in no particular order, with:
1. Aerospace – Spanky (https://www.aerospacevillage.org/)
2. Biohacking – Nina (https://www.villageb.io/)
3. Blue Team Game – Amy (https://www.cygence.com.au/about)
4. Car Hacking – Ben (https://www.carhackingvillage.com/)
5. ES 1 &#8211; Ben (https://embeddedvillage.org/)
6. ES 2 &#8211; Tivo (https://embeddedvillage.org/)
7. ES 3 – Thomas (https://www.linkedin.com/in/stacksmashing/) and he talks about hextree (https://www.hextree.io/)
8. Game Hackers – Julian (https://gamehacking.gg/)
9. IoT – Ben (https://iotvillage.org/index.html)
10. RF – ZeroChaos and Wasabi (https://rfhackers.com/)
11. Tamper Evident – Morfir (https://forum.defcon.org/node/14513?]]></googleplay:description>
	<googleplay:image href="https://redacted.au/wp-content/uploads/2024/09/DEFCON-Redacted.jpg"></googleplay:image>
	<googleplay:explicit>Yes</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>

<item>
	<title>Episode 1 &#8211; Naima &#038; Nathan</title>
	<link>https://redacted.au/podcast/episode-1/</link>
	<pubDate>Wed, 14 Aug 2024 11:15:46 +0000</pubDate>
	<dc:creator><![CDATA[Redacted Information Security]]></dc:creator>
	<guid isPermaLink="false">https://redacted.au/?post_type=podcast&#038;p=4071</guid>
	<description><![CDATA[<p>This week we&#8217;re speaking with some amazing red teamer guests;</p>
<h3>Naima</h3>
<p>Naima is a senior consultant and penetration tester with extensive experience in web application security, organisation, and network penetration testing and policy development. Naima has a Bachelor of Science (Chemistry) and a Master of Cyber Security. Her experience includes identification of a critical business logic flaw in a SalesForce application that led to a vulnerability that could have resulted in a $20,000 per attack to a client if publicly identified, as well as chained application vulnerabilities that saw a large-scale simulated data compromise against a client. Naima’s recent work has been the development of risk assessments for a large federal government client.</p>
<h3>Nathan</h3>
<p>Nathan is a highly competent Principal consultant and penetration tester with extensive expertise in network penetration testing and a solid background in red teaming. He possesses a deep interest in various areas, including internal and external infrastructure, wireless security, web application testing, and compliance. His core skill set encompasses web penetration testing, network penetration testing, infrastructure review, as well as exceptional customer service. With a strong foundation in critical and analytical thinking, Nathan consistently delivers comprehensive and effective solutions. Additionally, he takes charge of overseeing the development of Mercury&#8217;s adversarial C2 infrastructure, showcasing his leadership and technical prowess. Nathan has also conducted wireless workshops at the ADF Cyber Skills Challenge, teaching the community about wireless security.</p>]]></description>
	<itunes:subtitle><![CDATA[This week we&#8217;re speaking with some amazing red teamer guests;
Naima
Naima is a senior consultant and penetration tester with extensive experience in web application security, organisation, and network penetration testing and policy development. Nai]]></itunes:subtitle>
	<content:encoded><![CDATA[<p>This week we&#8217;re speaking with some amazing red teamer guests;</p>
<h3>Naima</h3>
<p>Naima is a senior consultant and penetration tester with extensive experience in web application security, organisation, and network penetration testing and policy development. Naima has a Bachelor of Science (Chemistry) and a Master of Cyber Security. Her experience includes identification of a critical business logic flaw in a SalesForce application that led to a vulnerability that could have resulted in a $20,000 per attack to a client if publicly identified, as well as chained application vulnerabilities that saw a large-scale simulated data compromise against a client. Naima’s recent work has been the development of risk assessments for a large federal government client.</p>
<h3>Nathan</h3>
<p>Nathan is a highly competent Principal consultant and penetration tester with extensive expertise in network penetration testing and a solid background in red teaming. He possesses a deep interest in various areas, including internal and external infrastructure, wireless security, web application testing, and compliance. His core skill set encompasses web penetration testing, network penetration testing, infrastructure review, as well as exceptional customer service. With a strong foundation in critical and analytical thinking, Nathan consistently delivers comprehensive and effective solutions. Additionally, he takes charge of overseeing the development of Mercury&#8217;s adversarial C2 infrastructure, showcasing his leadership and technical prowess. Nathan has also conducted wireless workshops at the ADF Cyber Skills Challenge, teaching the community about wireless security.</p>]]></content:encoded>
	<enclosure url="https://episodes.castos.com/kbkast/1809141/c1e-6wnpc2944xindopx-mk023245s602-sxchse.mp3" length="73667440" type="audio/mpeg"></enclosure>
	<itunes:summary><![CDATA[This week we&#8217;re speaking with some amazing red teamer guests;
Naima
Naima is a senior consultant and penetration tester with extensive experience in web application security, organisation, and network penetration testing and policy development. Naima has a Bachelor of Science (Chemistry) and a Master of Cyber Security. Her experience includes identification of a critical business logic flaw in a SalesForce application that led to a vulnerability that could have resulted in a $20,000 per attack to a client if publicly identified, as well as chained application vulnerabilities that saw a large-scale simulated data compromise against a client. Naima’s recent work has been the development of risk assessments for a large federal government client.
Nathan
Nathan is a highly competent Principal consultant and penetration tester with extensive expertise in network penetration testing and a solid background in red teaming. He possesses a deep interest in various areas, including internal and external infrastructure, wireless security, web application testing, and compliance. His core skill set encompasses web penetration testing, network penetration testing, infrastructure review, as well as exceptional customer service. With a strong foundation in critical and analytical thinking, Nathan consistently delivers comprehensive and effective solutions. Additionally, he takes charge of overseeing the development of Mercury&#8217;s adversarial C2 infrastructure, showcasing his leadership and technical prowess. Nathan has also conducted wireless workshops at the ADF Cyber Skills Challenge, teaching the community about wireless security.]]></itunes:summary>
	<itunes:image href="https://redacted.au/wp-content/uploads/2024/08/GUESTS-Naima-Nathan.jpg"></itunes:image>
	<image>
		<url>https://redacted.au/wp-content/uploads/2024/08/GUESTS-Naima-Nathan.jpg</url>
		<title>Episode 1 &#8211; Naima &#038; Nathan</title>
	</image>
	<itunes:explicit>true</itunes:explicit>
	<itunes:block>no</itunes:block>
	<itunes:duration>01:16:45</itunes:duration>
	<itunes:author><![CDATA[Redacted Information Security]]></itunes:author>	<googleplay:description><![CDATA[This week we&#8217;re speaking with some amazing red teamer guests;
Naima
Naima is a senior consultant and penetration tester with extensive experience in web application security, organisation, and network penetration testing and policy development. Naima has a Bachelor of Science (Chemistry) and a Master of Cyber Security. Her experience includes identification of a critical business logic flaw in a SalesForce application that led to a vulnerability that could have resulted in a $20,000 per attack to a client if publicly identified, as well as chained application vulnerabilities that saw a large-scale simulated data compromise against a client. Naima’s recent work has been the development of risk assessments for a large federal government client.
Nathan
Nathan is a highly competent Principal consultant and penetration tester with extensive expertise in network penetration testing and a solid background in red teaming. He possesses a deep interest in various areas, including internal]]></googleplay:description>
	<googleplay:image href="https://redacted.au/wp-content/uploads/2024/08/GUESTS-Naima-Nathan.jpg"></googleplay:image>
	<googleplay:explicit>Yes</googleplay:explicit>
	<googleplay:block>no</googleplay:block>
</item>
	</channel>
</rss>
