Exploited: The Cyber Truth

Exploited: The Cyber Truth
Podcast Description
Exploited: The Cyber Truth is a hard-hitting, no-fluff podcast exposing the realities of today’s cyber threat landscape and risks to critical infrastructure. Through candid conversations with top cybersecurity experts, industry leaders, and frontline defenders, the show breaks down recent high-profile vulnerabilities and exploits and covers innovative strategies used to stop them. To keep critical infrastructure safe, defenders need the upper hand. Tune in and get the cyber truth.
Podcast Insights
Content Themes
The podcast explores topics such as healthcare cybersecurity, automotive security, zero-day vulnerabilities, operational technology risks, and regulatory compliance, with episodes like 'Security Without Code Changes' addressing legislative impacts on medical device security and 'Shifting Cybersecurity Left in Automotive' discussing the Secure by Design approach for vehicle safety.

Exploited: The Cyber Truth is a hard-hitting, no-fluff podcast exposing the realities of today’s cyber threat landscape and risks to critical infrastructure. Through candid conversations with top cybersecurity experts, industry leaders, and frontline defenders, the show breaks down recent high-profile vulnerabilities and exploits and covers innovative strategies used to stop them. To keep critical infrastructure safe, defenders need the upper hand. Tune in and get the cyber truth.
In this episode of Exploited: The Cyber Truth, RunSafe Security CEO Joe Saunders joins host Paul Ducklin to confront a troubling reality: Iranian and pro-Iranian threat actors are targeting critical infrastructure in the United States. From small-town water utilities to nationwide energy providers, the systems we rely on every day are increasingly vulnerable.
Joe explains how groups like CyberAv3ngers—linked to the IRGC—are exploiting weak security in industrial control systems (ICS) and operational technology (OT). Their tactics aren’t always sophisticated, but they are effective: default passwords, outdated software, and internet-exposed devices are all they need to lock operators out and take control.
This urgent conversation explores:
- What we know about recent cyber campaigns targeting PLCs and HMIs
- How poorly secured infrastructure becomes a launchpad for nation-state actors
- What disruptions mean for national security and public health
- What municipalities, vendors, and regulators can do today to improve defenses
Whether you’re a system operator, vendor, or policymaker, this episode will leave you with a clearer picture of the risks—and what’s at stake.

Disclaimer
This podcast’s information is provided for general reference and was obtained from publicly accessible sources. The Podcast Collaborative neither produces nor verifies the content, accuracy, or suitability of this podcast. Views and opinions belong solely to the podcast creators and guests.
For a complete disclaimer, please see our Full Disclaimer on the archive page. The Podcast Collaborative bears no responsibility for the podcast’s themes, language, or overall content. Listener discretion is advised. Read our Terms of Use and Privacy Policy for more details.