The Abhisek Cast

Abhisek Rajkumar

The Abhisek Cast brings unfiltered conversations with people who have real insights into cybersecurity. These episodes are for cybersecurity enthusiasts, curious learners, and anyone deeply interested in the field. Each one offers practical takeaways and a real-world view of how cybersecurity works—beyond the buzzwords. We focus on quality to ensure your time is well spent and that you leave with something genuinely useful to guide your learning or career journey.

Episodes

  1. EP10 - Conversation with Creator of Metasploit | ft. HD Moore (CEO, runZero & Creator of Metasploit)

    12/27/2025

    EP10 - Conversation with Creator of Metasploit | ft. HD Moore (CEO, runZero & Creator of Metasploit)

    In this episode of The Abhisek Cast, I’m joined by HD Moore, creator of Metasploit and founder of runZero, for a deep and honest conversation about cybersecurity’s past, present, and future. We explore how security evolved from an underground, legally risky activity into a massive commercial industry—and what was lost along the way. HD shares the real design philosophy behind Metasploit, why it intentionally bypassed security products, and how open source shaped an entire generation of pentesters. The discussion also breaks down why asset inventory and discovery remain foundational yet unsolved problems, how runZero approaches attack surface mapping, and why many security tools only see half the environment they’re supposed to protect. We also talk about bug bounties, internal security testing, AI hype, and why relying on LLMs without understanding programming fundamentals is dangerous. A thoughtful episode for anyone building tools, breaking systems, or trying to understand what real security work looks like beyond buzzwords. Key Topics Covered: Early hacker culture vs modern cybersecurityWhy Metasploit was controversial—and why it workedOpen source vs commercial security modelsAsset discovery and attack surface managementBug bounties vs traditional penetration testingAI in security: overhyped or inevitable?Advice for people entering cybersecurity todayTimestamps:00:00 - Introduction00:40 - Early life & first exposure to computers02:00 - Burnout, scale, and community in cybersecurity03:40 - How security changed from the 90s to today06:10 - Why Metasploit was designed to break defenses10:40 - Open source vs commercializing security tools13:45 - runZero and the asset discovery problem19:45 - Underground stories from Metasploit days22:10 - Bug bounties: value, limits, and trade-offs27:25 - Internal security testing & risk28:20 - AI, GPUs, and why HD is cautious30:40 - Advice for newcomers to cybersecurity Thanks for watching!

    34 min
  2. EP09 - How to Build Security That Actually Works | ft. Jeff Man (Consultant, Advisor & Podcaster)

    12/12/2025

    EP09 - How to Build Security That Actually Works | ft. Jeff Man (Consultant, Advisor & Podcaster)

    In this episode, I speak with Jeff Man, a cybersecurity veteran with over 40 years of experience across NSA, red teaming, PCI, consulting, and industry leadership. Jeff shares a rare, ground-level view of what “security” actually means and why most organizations continue to get it wrong. We discuss his journey from solving puzzles to joining NSA, building the agency’s first red team, working on early cryptographic systems, and spending two decades teaching companies how to think about risk, data, and process. Jeff explains the critical difference between securing (technology, patching, fixing) and security (monitoring, process, diligence) and why the industry consistently overinvests in tools while underinvesting in thinking. This episode is a deep, practical, honest conversation about how security really works, and why mindset matters more than any product. Ideal for professionals across offensive, defensive, governance, and leadership roles who want to build long-lasting security programs. What You Will Learn (Key Takeaways): Why most companies fix technology but ignore processHow the cybersecurity mindset has shifted (and where it’s stuck)Stories from NSA, early crypto systems, and building the first red teamWhy PCI is misunderstood but extremely usefulThe difference between "securing" and "security"Why availability (not confidentiality) is today’s biggest problemThe importance of curiosity and the “hacker mindset”Why marketing shapes cybersecurity more than we admitHow to think, not just follow tools or trendsWhat keeps Jeff going after decades in the fieldTimestamps: 00:00 – Intro00:59 – Welcoming Jeff Man01:30 – Jeff’s journey from puzzles to NSA06:30 – Early cryptographic work & first software crypto system10:50 – Building NSA's first red team15:30 – Why companies don’t fix security even after pen tests17:30 – What organizations are getting wrong today20:10 – Why focusing only on technology never works22:30 – CIA triad misconceptions25:30 – Vulnerability overload & why “fix everything” is impossible28:30 – Securing vs. Security (monitoring, process, diligence)31:50 – Why process, not people, is the real failure point34:30 – Rethinking patching, compliance, and risk38:20 – How Jeff keeps himself informed today41:20 – Lessons from 900+ podcast episodes43:00 – The hacker mindset: curiosity, questioning, thinking49:20 – Why he continues speaking, podcasting, and mentoring51:21 – Closing thoughts

    53 min
  3. EP04 - Beyond the Tab: Exploring the Hidden Risks in Modern Browsers | ft. Dakshitaa Baby (Security Researcher, SquareX)

    06/27/2025

    EP04 - Beyond the Tab: Exploring the Hidden Risks in Modern Browsers | ft. Dakshitaa Baby (Security Researcher, SquareX)

    In this episode of The Abhisek Cast, we explore one of the most overlooked but highly targeted layers of modern cybersecurity: the browser. Joining us is Dakshitaa Babu, a Security Researcher and Product Evangelist at SquareX, who brings a fresh and practical perspective on the evolving threat landscape inside browsers. She explains how attackers abuse browser functionality, why traditional security tools fall short, and how developers and defenders alike can better prepare. If you’ve ever used browser extensions, clicked on an ad, or granted notification permissions, this episode is for you. What we cover in this episode: The browser as an active and often exploited attack surface Real-world examples of browser-native ransomware and fileless attacks The mechanics behind Browser-in-Browser (BiB) and fullscreen spoofing attacks How browser extensions can misuse permissions and lead to data leaks AI-related data exfiltration risks through third-party tools The importance of secure-by-design thinking during development Challenges of building custom enterprise browsers Tips for aspiring researchers entering the browser security space Observations from the field: misconfigurations, CVEs, and bypass techniques Building a career in browser security and Dakshitaa’s experience at SquareX About the Guest:Dakshitaa Babu is a Security Researcher and Product Evangelist at SquareX. With a background in analytics, venture capital, and data engineering, she brings a cross-disciplinary mindset to offensive research and browser-based defense. She actively contributes to building one of the industry’s first Browser Detection and Response (BDR) platforms, pushing boundaries in real-time web threat prevention. This episode is packed with insights for developers, product teams, security professionals, and researchers who want to understand the future of browser threats and how to build resilience against them. Also available on: YouTube: https://www.youtube.com/@abhisekcastApple Podcasts: https://podcasts.apple.com/us/podcast/the-abhisek-cast/id1815095644Amazon Music: https://music.amazon.com/podcasts/09de9397-74e4-459b-857d-1e16d8f7a232/the-abhisek-cast

    50 min

About

The Abhisek Cast brings unfiltered conversations with people who have real insights into cybersecurity. These episodes are for cybersecurity enthusiasts, curious learners, and anyone deeply interested in the field. Each one offers practical takeaways and a real-world view of how cybersecurity works—beyond the buzzwords. We focus on quality to ensure your time is well spent and that you leave with something genuinely useful to guide your learning or career journey.