CyberGuardians

CyberGuardians

Welcome to CyberGuardians! Join your host, Marcellus, as he explores the latest cybersecurity threats and trends. Each episode offers expert insights, real-world examples, and practical tips to help you stay ahead of cybercriminals. Whether you're a cybersecurity professional, a tech enthusiast, or just looking to protect your digital life, CyberGuardians equips you with the knowledge to navigate online security. Stay secure and informed with CyberGuardians. Connect with Marcellus through LinkedIn at: Marcellus T Instagram: techhearthustle

Episodes

August 13, 2025 2 mins

CyberGuardians presents a special bonus episode: New Announcement.


Change is in the air, and the future of the podcast is about to get even more exciting. Season 3 is on the way, but the details—and surprises—are staying under wraps for now.


Listen in to uncover hints about what’s coming next.


Music Credit:

• Title: MewMew

• Artist: Tea K Pea

Mark as Played

In this short CyberGuardians bonus episode, we unpack the real-world dangers behind ChatGPT conversations being indexed by search engines. This unexpected vulnerability could be exploited by attackers for social engineering, phishing, and targeted reconnaissance. Learn why this matters, how it puts personal and business data at risk, and why it's critical to think twice before sharing anything sensitive through AI platforms.

Mark as Played
June 9, 2025 5 mins

In this season finale of CyberGuardians, I reflect on the incredible journey we’ve taken together. From breaking down SIM swapping and AI-driven phishing attacks, to exploring the 23andMe data breach, Wi-Fi advancements, the future of AI in cybersecurity, and even hands-on demos like the reverse shell walkthrough — this season was a leap forward.

I’ve grown as a host, researcher, and cyber enthusiast — and your support made that pos...

Mark as Played

In today's digital age, cyber threats are more prevalent than ever. Whether it's your bank account, social media, or email, knowing how to respond to a hack is crucial. In this episode, we break down:

  • Immediate steps to take when you suspect a breach.
  • How to secure your accounts and personal information.
  • Preventative measures to protect yourself in the future.

Join us as we navigate the essential actions every individual shoul...

Mark as Played

What exactly is a port — and how do hackers use them to establish reverse or bind shells? In this episode of CyberGuardians, our guest host fills in for Marcellus to explore the fundamentals of ports, including the difference between well-known, registered, and dynamic ranges, and how they tie directly into remote access and exploitation tactics. Whether you're new to cybersecurity or sharpening your skills, this episode walks you ...

Mark as Played
April 30, 2025 7 mins

In this quick demo, I walk you through the basics of a reverse shell — what it is, why it's used, and how attackers take control of a system. I’ll also briefly explain the difference between a bind shell and a reverse shell before diving straight into a live demonstration using Kali Linux and Metasploitable. Watch as I show how a simple Netcat command can open a doorway for remote control. Short, simple, and powerful — don’t miss i...

Mark as Played

In this episode of CyberGuardians, we dive into the world of PBX hacking — the art of breaking into private phone systems to make free calls, set up hidden lines, and explore networks once thought to be secure. From the early days of phreaking to modern VoIP vulnerabilities, we uncover how these attacks worked, why they were so effective, and how organizations today can better defend against them. Tune in for a quick yet fascinatin...

Mark as Played
April 23, 2025 3 mins

In this follow-up to our previous episode, we go deeper into the world of exploitation with a clear breakdown of reverse shells and bind shells — two essential concepts in ethical hacking. With Marcellus out recovering from an irritated throat, a guest voice steps in to keep the knowledge flowing. Learn why reverse shells are so pivotal in cybersecurity, how attackers use them to bypass firewalls, and how you can simulate these tec...

Mark as Played

In this episode of CyberGuardians, we dive into the world of USB drop attacks—how hackers weaponize flash drives, leave them in public places, and rely on human curiosity to infiltrate networks. From basic malware to advanced BadUSB devices, we explain the tactics, real-world cases, and how you can protect yourself and your organization from one of the oldest yet most effective physical attack vectors.

Mark as Played

In this special finale of CyberGuardians, we take a moment to reflect on the journey through Season 1. Join Marcellus as he recaps the most important lessons and insights shared throughout the season, from the intricacies of computer components to essential cybersecurity practices. This episode also includes a heartfelt message of gratitude to the audience for their support, with a call to continue growing the CyberGuardians commun...

Mark as Played

In this episode of CyberGuardians, we break down the real and rising threat of SIM swapping. Learn how attackers trick mobile carriers into hijacking your phone number, why it’s so dangerous, and what steps you can take to stay protected. From social engineering to stolen credentials, this is one of the fastest ways for hackers to bypass 2FA and take control of your online life.


Music Credits:'Myst' by Tea K Pea, used un...

Mark as Played

In this episode of CyberGuardians, we’ll dive into how AI and machine learning are changing the phishing game. From more convincing fake emails to dynamic social engineering tactics, AI is making phishing campaigns harder to detect and even more effective. We’ll explain how these advanced techniques work, what to look out for, and how individuals and organizations can stay one step ahead.

Music Credits:'Myst' by Tea K Pea, u...

Mark as Played

In this episode of CyberGuardians, we break down the 23andMe breach that exposed the genetic data of over 6.9 million users. This wasn’t just another hack—it was a credential stuffing attack with massive privacy consequences. From reused passwords to deep ancestry leaks, we explore how this happened, why it’s such a big deal, and what lessons both individuals and companies need to learn. If you’ve ever used a DNA service, this epis...

Mark as Played

In this behind-the-scenes episode, I’m taking you through my journey of improving the audio quality on the CyberGuardians podcast. From inconsistent episodes to gear upgrades, I talk about what I’ve learned using different types of microphones—including dynamic and condenser mics—and the pros and cons of each.

I’ll break down how bitrate affects audio clarity, why your editing software matters, and what mistakes I’ve made (like reco...

Mark as Played

Welcome back to CyberGuardians, your go-to podcast for everything cybersecurity and tech. In today’s episode, we uncover the hidden risks behind Bluetooth technology. From classic attacks like Bluejacking and Bluesnarfing to modern BLE sniffing and relay exploits, learn how hackers silently connect to your devices and extract data without ever touching your network. Stay ahead, stay secured, and tune in to understand how Bluetooth ...

Mark as Played

In this episode of CyberGuardians, we expose how hackers are quietly hijacking corporate PBX systems to rake in profits—without anyone noticing. Learn how these outdated but widespread phone systems are being exploited, how attackers turn them into money-making machines, and what you can do to lock yours down before it costs you thousands. Stay sharp. Stay secure.

Music Credits:'Myst' by Tea K Pea, used under Creative Common...

Mark as Played
March 16, 2025 3 mins

Mozilla, the company behind Firefox, has long been a champion of online privacy—but a recent update to their Terms of Use has raised concerns among users and privacy advocates. In this episode of CyberGuardians, we break down the controversy, discuss what the new terms actually mean, and explore whether Firefox is still the privacy-friendly browser it claims to be.

Did Mozilla’s wording create unnecessary panic, or is this a sign of...

Mark as Played

Wi-Fi has transformed how we connect, but do you know how it evolved? In this episode of CyberGuardians, we explore the journey from 802.11b to Wi-Fi 7 and beyond. Learn how each generation improved speed, efficiency, and reliability, plus what Wi-Fi 8 might bring in 2028.

🔹 Key differences between Wi-Fi 5, Wi-Fi 6, and Wi-Fi 7
🔹 How OFDMA, MU-MIMO, and beamforming enhance performance
🔹 The future of wireless tech and its impact on...

Mark as Played

💡 In this episode of CyberGuardians, we dive into DeepSeek AI—a new open-source AI model that’s been making waves. But is it safe to use? How does it compare to ChatGPT? And what are the security concerns you should know about?

🔍 What You’ll Learn:

  • What DeepSeek AI is and how it works
  • Security concerns, including data privacy and AI misuse
  • A comparison between DeepSeek AI and ChatGPT
  • My final thoughts on whether you sh...
Mark as Played

Exciting news! In this episode, I’m introducing a special guest who will be joining me on the CyberGuardians podcast. We recently connected on LinkedIn, and after a great conversation, I knew they’d bring valuable insights to the show.

Get ready for an engaging discussion on cybersecurity, career growth, and the latest industry trends. Stay tuned for our upcoming episode together—it’s going to be packed with knowledge and real-worl...

Mark as Played

Popular Podcasts

    Football’s funniest family duo — Jason Kelce of the Philadelphia Eagles and Travis Kelce of the Kansas City Chiefs — team up to provide next-level access to life in the league as it unfolds. The two brothers and Super Bowl champions drop weekly insights about the weekly slate of games and share their INSIDE perspectives on trending NFL news and sports headlines. They also endlessly rag on each other as brothers do, chat the latest in pop culture and welcome some very popular and well-known friends to chat with them. Check out new episodes every Wednesday. Follow New Heights on the Wondery App, YouTube or wherever you get your podcasts. You can listen to new episodes early and ad-free, and get exclusive content on Wondery+. Join Wondery+ in the Wondery App, Apple Podcasts or Spotify. And join our new membership for a unique fan experience by going to the New Heights YouTube channel now!

    The Breakfast Club

    The World's Most Dangerous Morning Show, The Breakfast Club, With DJ Envy, Jess Hilarious, And Charlamagne Tha God!

    Fudd Around And Find Out

    UConn basketball star Azzi Fudd brings her championship swag to iHeart Women’s Sports with Fudd Around and Find Out, a weekly podcast that takes fans along for the ride as Azzi spends her final year of college trying to reclaim the National Championship and prepare to be a first round WNBA draft pick. Ever wonder what it’s like to be a world-class athlete in the public spotlight while still managing schoolwork, friendships and family time? It’s time to Fudd Around and Find Out!

    Dateline NBC

    Current and classic episodes, featuring compelling true-crime mysteries, powerful documentaries and in-depth investigations. Follow now to get the latest episodes of Dateline NBC completely free, or subscribe to Dateline Premium for ad-free listening and exclusive bonus content: DatelinePremium.com

    24/7 News: The Latest

    The latest news in 4 minutes updated every hour, every day.

Advertise With Us
Music, radio and podcasts, all free. Listen online or download the iHeart App.

Connect

© 2025 iHeartMedia, Inc.