
The Hacker's Cache
Kyser Clark - Cybersecurity
The show that decrypts the secrets of offensive cybersecurity, one byte at a time. Every week I invite you into the world of ethical hacking by interviewing leading offensive security practitioners. If you are a penetration tester, bug bounty hunter, red teamer, or blue teamer who wants to better understand the modern hacker mindset, whether you are new or experienced, this show is for you.
All episodes
Best episodes
Top 10 The Hacker's Cache Episodes
Goodpods has curated a list of the 10 best The Hacker's Cache episodes, ranked by the number of listens and likes each episode have garnered from our listeners. If you are listening to The Hacker's Cache for the first time, there's no better place to start than with one of these standout episodes. If you are a fan of the show, vote for your favorite The Hacker's Cache episode by adding your comments to the episode page.

#29 InfoSec Pat’s Journey From Network Engineer to Cyber Mentor:
The Hacker's Cache
01/08/25 • 41 min
Kyser Clark interviews Patrick Gorman, also known as InfoSec Pat, a seasoned cybersecurity professional with over 23 years of experience. They discuss the importance of certifications in the cybersecurity field, the challenges of retaining knowledge, and the journey of creating educational content on YouTube. Pat shares insights on his motivations for teaching and mentoring others, as well as his thoughts on bug bounty programs and the value of collaborative learning.
Check out InfoSec Pat on YouTube: https://www.youtube.com/c/InfoSecPat
And Connect with Patrick Gorman on LinkedIn: https://www.linkedin.com/in/infosecpat/
Takeaways
- Certifications are valuable but do not guarantee knowledge.
- Creating content can be a way to reinforce one's own learning.
- Bug bounty programs can be approached collaboratively for better results.
- Teaching others can be a fulfilling way to give back to the community.
- Staying updated with technology is essential in the fast-paced field of cybersecurity.
- Networking with peers can enhance learning experiences.
- The journey of creating educational content can be challenging yet rewarding.
- Certifications should align with personal interests and career goals.
- Mentoring others can help bridge the knowledge gap in the industry. Unique perspectives in teaching can enhance learning.
- Mentoring should be valued and compensated.
- Burnout is a real challenge in cybersecurity careers.
- Engaging instructors can make a significant difference in learning.
- Networking is crucial for career advancement in cybersecurity.
- Free help often leads to a lack of appreciation.
- Taking breaks is essential to avoid burnout.
- Having a structured schedule can help manage time effectively.
- Family should always be prioritized over work.
- Different instructors resonate with different learners.
Connect
---------------------------------------------------
https://www.KyserClark.com
https://www.KyserClark.com/Newsletter
https://youtube.com/KyserClark
https://www.linkedin.com/in/KyserClark
https://www.twitter.com/KyserClark
https://www.instagram/KyserClark
https://facebook.com/CyberKyser
https://twitch.tv/KyserClark_Cybersecurity
https://www.tiktok.com/@kyserclark
https://discord.gg/ZPQYdBV9YY
Music by Karl Casey @ White Bat Audio
Attention Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.
Opinions are my own and may not represent the positions of my employer.

#17 Unpacking Bug Bounty Strategies with RootSploit: Zero Days, Recon, and Vulnerabilities
The Hacker's Cache
10/16/24 • 37 min
Cybersecurity professionals Kyser Clark and Pranit Garud (RootSploit) discuss their experiences in the field. They cover topics such as bug bounty programs, the role of an offensive security engineer, and the differences between consulting and working for a Fortune 500 company. Pranit shares tips for getting started in bug bounty hunting and emphasizes the importance of understanding the business logic of a company. He also highlights the need for a mindset shift when transitioning from consulting to an internal security role.
Connect with Pranit on LinkedIn: https://www.linkedin.com/in/pranit-garud/
Takeaways
- Bug bounty hunting requires a proactive and research-oriented mindset, as well as a deep understanding of the target company's technologies and business logic.
- Working as an offensive security engineer in a Fortune 500 company offers the opportunity to see the inner workings of the organization and make a greater impact on security.
- Transitioning from consulting to an internal security role requires a shift in focus from exploitation to securing and collaborating with developers.
- Building a close relationship with developers and understanding their challenges can lead to more effective security measures.
- The pace of work in a Fortune 500 company may be slower due to approval processes and the need for careful consideration of potential impacts.
Connect
---------------------------------------------------
https://www.KyserClark.com
https://www.KyserClark.com/Newsletter
https://youtube.com/KyserClark
https://www.linkedin.com/in/KyserClark
https://www.twitter.com/KyserClark
https://www.instagram/KyserClark
https://facebook.com/CyberKyser
https://twitch.tv/KyserClark_Cybersecurity
https://www.tiktok.com/@kyserclark
https://discord.gg/ZPQYdBV9YY
Music by Karl Casey @ White Bat Audio
Attention Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.
Opinions are my own and may not represent the positions of my employer.

#9 Red Teaming & Malware Development ft. Nathan Rice
The Hacker's Cache
08/21/24 • 35 min
In this conversation, Kyser Clark interviews Nathan Rice, a senior penetration tester, about his background and experience in cybersecurity. They discuss the differences between penetration testing and red team operations, the importance of starting with penetration testing before moving to red teaming, and the challenges and rewards of obtaining certifications. They also touch on the skills required for malware development and the importance of staying up to date with evolving techniques. Nathan shares advice for aspiring red team operators and emphasizes the need to be proactive and not be afraid to ask questions.
Connect with Nathan Rice: https://www.linkedin.com/in/nathan-rice-b52209123/
Takeaways
- Penetration testing and red team operations have distinct differences, with red teaming requiring more patience, stealth, and intent to emulate real-world threat adversaries.
- Starting with penetration testing before transitioning to red team operations is recommended, as the skills learned in penetration testing translate well to red teaming.
- Obtaining certifications in cybersecurity, such as OSCP and OSEP, can be challenging and may require multiple attempts, but they provide valuable knowledge and recognition in the field.
- Malware development skills are important for red team operators, as having the ability to create custom tools and bypass EDRs is crucial for success.
- Aspiring red team operators should not be afraid to ask questions, be proactive, and not get caught up in analysis paralysis. Getting caught is part of the learning process and should be used as an opportunity to improve.
- Moving with intent and being able to think creatively are essential skills for red team operators, as they need to constantly adapt and find new ways to bypass defenses.
Connect
---------------------------------------------------
https://www.KyserClark.com
https://www.KyserClark.com/Newsletter
https://youtube.com/KyserClark
https://www.linkedin.com/in/KyserClark
https://www.twitter.com/KyserClark
https://www.instagram/KyserClark
https://facebook.com/CyberKyser
https://twitch.tv/KyserClark_Cybersecurity
https://www.tiktok.com/@kyserclark
https://discord.gg/ZPQYdBV9YY
Music by Karl Casey @ White Bat Audio
Attention Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.
Opinions are my own and may not represent the positions of my employer.

12/11/24 • 41 min
Kyser Clark engages with cybersecurity expert Albert Corzo, who shares his extensive experience in ethical hacking, bug bounty programs, and the importance of certifications in the field. Albert discusses his past experiences, including hacking the U.S. government, and emphasizes the need for understanding cybercrime and threat actors to better protect organizations. The conversation also covers the differences between compliance and security, the challenges of bug bounty hunting, and the significance of mentorship in cybersecurity careers.
Bug bounty programs can serve as a practical playground for ethical hackers.
Understanding how cybercriminals operate is crucial for effective security measures.
Compliance does not equate to security; companies must prioritize actual data protection.
Phishing remains a significant threat, accounting for 70% of attacks.
Real-world experience is invaluable in cybersecurity, beyond just certifications.
Adversary simulations can help organizations prepare for potential attacks.
Networking and mentorship are key components for success in cybersecurity careers.
Connect with Albert on LinkedIn: https://www.linkedin.com/in/alberto-corzo-gonzalez/
Check out the Coffee&&Pizza Podcast: https://youtu.be/hcLMYEb8yA4?si=UmoHImLAUTNOxce4
Connect
---------------------------------------------------
https://www.KyserClark.com
https://www.KyserClark.com/Newsletter
https://youtube.com/KyserClark
https://www.linkedin.com/in/KyserClark
https://www.twitter.com/KyserClark
https://www.instagram/KyserClark
https://facebook.com/CyberKyser
https://twitch.tv/KyserClark_Cybersecurity
https://www.tiktok.com/@kyserclark
https://discord.gg/ZPQYdBV9YY
Music by Karl Casey @ White Bat Audio
Attention Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.
Opinions are my own and may not represent the positions of my employer.

#15 From Zero to Hero: How Anyone Can Succeed in Cybersecurity
The Hacker's Cache
10/02/24 • 34 min
In this solo episode, Kyser Clark discusses the accessibility of cybersecurity careers, emphasizing that anyone can enter the field regardless of their background. He shares his personal journey from blue-collar jobs to becoming a penetration tester, highlighting the importance of certifications and continuous learning. Kyser provides actionable steps for breaking into cybersecurity, including gaining tech experience, obtaining certifications, and effectively marketing oneself. He concludes by encouraging listeners to remain persistent and adaptable in their job search, reminding them that while anyone can enter the field, competition is fierce.
Takeaways
- Anyone can get into cybersecurity regardless of background.
- Certifications are often more beneficial than college degrees.
- Learning from failure is a crucial part of the process.
- You don't need to be good at math to work in tech.
- Discipline and hard work are essential for success.
- Aggressive patience is key in the job search process.
- Rejections are often due to cultural fit, not skill level.
- Networking and marketing oneself are vital for job hunting.
- Internships are a great way to gain experience.
- Continuous learning is necessary to advance in cybersecurity.
Connect
---------------------------------------------------
https://www.KyserClark.com
https://www.KyserClark.com/Newsletter
https://youtube.com/KyserClark
https://www.linkedin.com/in/KyserClark
https://www.twitter.com/KyserClark
https://www.instagram/KyserClark
https://facebook.com/CyberKyser
https://twitch.tv/KyserClark_Cybersecurity
https://www.tiktok.com/@kyserclark
https://discord.gg/ZPQYdBV9YY
Music by Karl Casey @ White Bat Audio
Attention Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.
Opinions are my own and may not represent the positions of my employer.

#14 Social Engineering Unleashed: DEF CON Insights from Jacob Villarreal
The Hacker's Cache
09/25/24 • 34 min
Kyser Clark interviews Jacob Villarreal, a penetration tester, about his journey into the cybersecurity field, his experiences at DEFCON, and various topics related to cybersecurity. Jacob shares his background, including his education, certifications, and transition from IT roles to penetration testing. The discussion covers the importance of networking, volunteering at conferences, and key cybersecurity issues such as biometrics, automation, boot camps, and the role of certifications. Jacob also offers insights into social engineering and advice for those interested in pursuing a cybersecurity career.
Connect with Jacob Villarreal on LinkedIn: https://www.linkedin.com/in/jacob-villarreal-utsa/
Takeaways:
- Cybersecurity should be a top priority for companies, but financial considerations often take precedence.
- Networking is crucial in the cybersecurity field and can lead to valuable connections and opportunities.
- Social engineering is an important skill for red teamers, and building rapport and trust is essential in these engagements. Studying sales techniques can be helpful in this regard.
- Conferences like DEFCON offer valuable learning and networking opportunities, though the cost should be carefully considered.
- Engaging in conversations with people in public settings can improve social skills and lead to unexpected connections.
- Reaching out to professionals in the cybersecurity field through platforms like LinkedIn can provide valuable insights and advice.
Connect
---------------------------------------------------
https://www.KyserClark.com
https://www.KyserClark.com/Newsletter
https://youtube.com/KyserClark
https://www.linkedin.com/in/KyserClark
https://www.twitter.com/KyserClark
https://www.instagram/KyserClark
https://facebook.com/CyberKyser
https://twitch.tv/KyserClark_Cybersecurity
https://www.tiktok.com/@kyserclark
https://discord.gg/ZPQYdBV9YY
Music by Karl Casey @ White Bat Audio
Attention Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.
Opinions are my own and may not represent the positions of my employer.

#24 Building a Career Together: Lessons from Clint & Si The Hackers
The Hacker's Cache
12/04/24 • 39 min
Kyser Clark is joined by Simon and Clint from the YouTube channel 'Clint & Si The Hackers.' They discuss their journey into cybersecurity, the importance of practical experience over formal education, and the benefits of collaboration in building a successful career. The conversation covers various aspects of penetration testing, the challenges faced in their careers, and the significance of certifications and continuous learning in the field.
Watch Clint & Si The Hackers On YouTube: https://www.youtube.com/@_The_hackers
Connect with Clint on Linkedin: https://www.linkedin.com/in/clinton-elves-180ba0148/
Connect with Simon on Linkedin: https://www.linkedin.com/in/simon-exley-355816194/
Takeaways
- A college degree is not essential for a cybersecurity career.
- Practical experience is more valuable than theoretical knowledge.
- Collaboration can significantly enhance career growth.
- Networking and building relationships are crucial in the industry.
- Certifications can help in career advancement.
- Learning from peers can accelerate skill development.
- The cybersecurity field is diverse with many specializations.
- Challenges faced in moving countries can lead to personal growth.
- Engaging with the community through platforms like LinkedIn is beneficial.
- Continuous learning is key to staying relevant in cybersecurity.
Connect
---------------------------------------------------
https://www.KyserClark.com
https://www.KyserClark.com/Newsletter
https://youtube.com/KyserClark
https://www.linkedin.com/in/KyserClark
https://www.twitter.com/KyserClark
https://www.instagram/KyserClark
https://facebook.com/CyberKyser
https://twitch.tv/KyserClark_Cybersecurity
https://www.tiktok.com/@kyserclark
https://discord.gg/ZPQYdBV9YY
Music by Karl Casey @ White Bat Audio
Attention Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.
Opinions are my own and may not represent the positions of my employer.

#20 What it REALLY Takes to Pass OSCP (and What They Don’t Tell You) ft. Trent Miller
The Hacker's Cache
11/06/24 • 36 min
Kyser Clark interviews Trent Miller, a cybersecurity professional with a diverse background in IT and security roles. They discuss Trent's career journey, the challenges of breaking into cybersecurity, the importance of networking, and insights on certifications like OSCP. Trent shares his experiences with the job market, the reality of skill shortages, and the significance of community engagement through groups like DC608. The conversation emphasizes the need for collaboration and continuous learning in the cybersecurity field.
Connect with Trent Miller on LinkedIn: https://www.linkedin.com/in/azureadtrent/
Takeaways
Networking is crucial for breaking into cybersecurity.
The OSCP certification can boost confidence and job prospects.
Employers often seek unrealistic qualifications, creating a perceived skill shortage.
Hands-on experience and collaboration are key to success in cybersecurity.
The job market can be challenging, but persistence pays off.
Community groups like DC608 provide valuable support and resources.
It's important to balance study and personal life when pursuing certifications.
Anyone can enter the field with dedication and the right mindset.
Connect
---------------------------------------------------
https://www.KyserClark.com
https://www.KyserClark.com/Newsletter
https://youtube.com/KyserClark
https://www.linkedin.com/in/KyserClark
https://www.twitter.com/KyserClark
https://www.instagram/KyserClark
https://facebook.com/CyberKyser
https://twitch.tv/KyserClark_Cybersecurity
https://www.tiktok.com/@kyserclark
https://discord.gg/ZPQYdBV9YY
Music by Karl Casey @ White Bat Audio
Attention Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.
Opinions are my own and may not represent the positions of my employer.

#13 Hacking Time: Real World Skills They Don't Teach You | Trent Darrow
The Hacker's Cache
09/18/24 • 39 min
Kyser Clark interviews Trent Darrow, a senior penetration tester and cyber protection team crew lead. They discuss Trent's background, certifications, and his role in building a red team. They also touch on ethical dilemmas in the industry, the effectiveness of certifications in preparing for real-world pen testing, and the importance of skills like time management and effective communication. In this conversation, Trent and Kyser discuss time management in cybersecurity exams, the challenges of scanning large networks, the role of a cyber warfare technician, the transition between civilian and military careers, strategies for preparing for the OSCP and OSEP exams, the value of participating in CTFs, and the future of the cybersecurity field.
Connect with Trent Darrow on LinkedIn: https://www.linkedin.com/in/trenton-darrow/
Takeaways:
Trent's background spans help desk, IT specialist roles, network engineering, and cybersecurity contracting, with certifications like OSCP, GCFA, GWAPT, GPEN, and GCPN.
Real-world skills like time management, note-taking, and communication are crucial, differing from those needed for exams or CTFs.
Ethical dilemmas, such as downgrading findings to please clients, can be common in the industry.
Preparing for certifications like OSCP and OSEP requires practice, extensive note-taking, and ensuring tools work properly through a proxy.
AI isn't a threat to cybersecurity jobs, but learning web application security is essential for staying competitive.
Connect
---------------------------------------------------
https://www.KyserClark.com
https://www.KyserClark.com/Newsletter
https://youtube.com/KyserClark
https://www.linkedin.com/in/KyserClark
https://www.twitter.com/KyserClark
https://www.instagram/KyserClark
https://facebook.com/CyberKyser
https://twitch.tv/KyserClark_Cybersecurity
https://www.tiktok.com/@kyserclark
https://discord.gg/ZPQYdBV9YY
Music by Karl Casey @ White Bat Audio
Attention Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.
Opinions are my own and may not represent the positions of my employer.

05/14/25 • 39 min
Betta Lyon Delsordo started coding at just 13 years old and never looked back. In this episode, she shares how learning to code as a rebellious teen sparked a career that led her from freelance web development to becoming a lead application pentester specializing in web, cloud, and AI hacking. We talk about how anyone can learn to code, the importance of specialization in cybersecurity, why physical security is overrated, and how to break into AI hacking. Whether you're brand new to tech or looking to pivot your career, Betta's story will challenge your excuses and inspire you to take action.
Connect with Betta Lyon Delsordo on LinkedIn: https://www.linkedin.com/in/betta-lyon-delsordo/
Connect
---------------------------------------------------
https://www.KyserClark.com
https://www.KyserClark.com/Newsletter
https://youtube.com/KyserClark
https://www.linkedin.com/in/KyserClark
https://www.twitter.com/KyserClark
https://www.instagram/KyserClark
https://facebook.com/CyberKyser
https://twitch.tv/KyserClark_Cybersecurity
https://www.tiktok.com/@kyserclark
https://discord.gg/ZPQYdBV9YY
Music by Karl Casey @ White Bat Audio
Attention Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.
Opinions are my own and may not represent the positions of my employer.
Show more best episodes

Show more best episodes
FAQ
How many episodes does The Hacker's Cache have?
The Hacker's Cache currently has 47 episodes available.
What topics does The Hacker's Cache cover?
The podcast is about Infosec, Pentesting, Hacking, Podcasts, Technology, Business, Hacker, Careers and Cybersecurity.
What is the most popular episode on The Hacker's Cache?
The episode title '#23 SOC Analyst Life: Challenges & Secrets from Trent Williams' is the most popular.
What is the average episode length on The Hacker's Cache?
The average episode length on The Hacker's Cache is 37 minutes.
How often are episodes of The Hacker's Cache released?
Episodes of The Hacker's Cache are typically released every 7 days.
When was the first episode of The Hacker's Cache?
The first episode of The Hacker's Cache was released on Jul 1, 2024.
Show more FAQ

Show more FAQ