Hack Dissection
Podcast Description
🔍 Welcome to Hack Dissection, where we pull back the curtain on cybersecurity, ethical hacking, and the digital threats shaping our world. Hosted by Mike Lisi, founder of Maltek Solutions and an expert in Hacking For Good, this podcast takes you behind the scenes of real-world cyber attacks, penetration testing, and security strategies that keep businesses and individuals safe. 💻 What You’ll Get in Every Episode: ✅ Deep dives into ethical hacking and cybersecurity trends ✅ Breakdowns of real cyber threats—how they happen & how to stop them ✅ Insider stories from security professionals, red teamers, and industry experts ✅ Practical tips to strengthen your security and protect your data 📢 Subscribe & Stay Ahead of Cyber Threats! If you're a business owner, IT professional, or just someone who wants to understand cybersecurity without the jargon, you’re in the right place.
Podcast Insights
Content Themes
The podcast explores several key themes including ethical hacking, penetration testing, and emerging cybersecurity trends, with episodes providing insights into real-world cyber attacks, security strategies, and vulnerabilities. For example, episodes break down the unseen security gaps businesses face and real case studies on tool-assisted exploitation in technology, drawing lessons on how to enhance digital safety.

🔍 Welcome to Hack Dissection, where we pull back the curtain on cybersecurity, ethical hacking, and the digital threats shaping our world. Hosted by Mike Lisi, founder of Maltek Solutions and an expert in Hacking For Good, this podcast takes you behind the scenes of real-world cyber attacks, penetration testing, and security strategies that keep businesses and individuals safe. 💻 What You’ll Get in Every Episode: ✅ Deep dives into ethical hacking and cybersecurity trends ✅ Breakdowns of real cyber threats—how they happen & how to stop them ✅ Insider stories from security professionals, red teamers, and industry experts ✅ Practical tips to strengthen your security and protect your data 📢 Subscribe & Stay Ahead of Cyber Threats! If you’re a business owner, IT professional, or just someone who wants to understand cybersecurity without the jargon, you’re in the right place.
In this episode of Hack Dissection, hosts Mike Lisi and Graham O’Donnell sit down with red teamer, educator, and co-author of Redefining Hacking — Wesley Thurner. What starts as a light-hearted conversation about soldering badges at Cactus Con quickly dives deep into red team tactics, AI exploitation, and the culture of CTF (Capture the Flag) competitions.
Wesley shares real-world stories from his time in the military, his role on red teams at Amazon and Intuit, and his work organizing large-scale CTF events through ThreatSim and Red Team Village. From session hijacking and model poisoning to building MVP command-and-control tools with LLMs, this episode is packed with insights from the front lines of ethical hacking.
Whether you’re a cybersecurity pro, CTF player, or curious about how AI is reshaping the red team playbook, this conversation offers a rare look behind the curtain — with humor, humility, and a whole lot of practical wisdom.
Topics covered:
- Creative red team engagements involving AI platforms
- How tainted training data can derail machine learning models
- The evolving power (and danger) of prompt engineering
- CTF design philosophy and community-first organizing
- Why the simplest hacks still work in complex systems
📕 Redefining Hacking is available now — and you might even catch Wesley signing copies at DEF CON’s Red Team Village.

Disclaimer
This podcast’s information is provided for general reference and was obtained from publicly accessible sources. The Podcast Collaborative neither produces nor verifies the content, accuracy, or suitability of this podcast. Views and opinions belong solely to the podcast creators and guests.
For a complete disclaimer, please see our Full Disclaimer on the archive page. The Podcast Collaborative bears no responsibility for the podcast’s themes, language, or overall content. Listener discretion is advised. Read our Terms of Use and Privacy Policy for more details.