
Insights from recent episode analysis
Audience Interest
Podcast Focus
Publishing Consistency
Platform Reach
Insights are generated by CastFox AI using publicly available data, episode content, and proprietary models.
Est. Listeners
Based on iTunes & Spotify (publisher stats).
- Per-Episode Audience
Est. listeners per new episode within ~30 days
1 - 1,000 - Monthly Reach
Unique listeners across all episodes (30 days)
1 - 5,000 - Active Followers
Loyal subscribers who consistently listen
1 - 500
Market Insights
Platform Distribution
Reach across major podcast platforms, updated hourly
Total Followers
—
Total Plays
—
Total Reviews
—
* Data sourced directly from platform APIs and aggregated hourly across all major podcast directories.
On the show
Recent episodes
Episode 11 - The New Ransomware Playbook
Apr 27, 2026
28m 06s
Episode 10 - SaaS Sprawl, Shadow IT, and the Trust You Already Gave Away
Apr 23, 2026
35m 16s
Episode 9: Identity, the Modern Battlefield of Cybersecurity
Apr 21, 2026
30m 15s
Episode 8 - Cyber Fatigue, Alert Overload
Apr 20, 2026
28m 39s
Episode 7 - Cyber Resilience in the Boardroom
Apr 17, 2026
33m 58s
Social Links & Contact
Official channels & resources
Official Website
Login
RSS Feed
Login
| Date | Episode | Description | Length | ||||||
|---|---|---|---|---|---|---|---|---|---|
| 4/27/26 | Episode 11 - The New Ransomware Playbook | In Episode 11, Omar Rao breaks down why ransomware in 2026 is no longer just about encryption. It is about leverage. From active groups like Qilin, Akira, Play, Cl0p, Medusa, DragonForce, and LockBit 5.0 to the newer tactics built around identity abuse, SaaS pressure, backup targeting, and AI-assisted tradecraft, this episode explains how modern ransomware crews really operate and what enterprises need to understand before access turns into business disruption.A lot of people still think ransomware starts when the ransom note appears. That is already too late.In this episode, I break down how ransomware in 2026 really works. It is no longer just about encrypting files. It is about leverage, identity abuse, stolen access, SaaS pressure, backup targeting, and recovery denial.I also cover the groups making the most noise right now, including Qilin, Akira, Play, Cl0p, Medusa, DragonForce, and LockBit 5.0, along with the newer tactics shaping modern ransomware operations.We cover:• How ransomware groups are getting in now• Why identity and SaaS matter more than ever• How AI is speeding up attacker tradecraft• What enterprises should do before access turns into pressureIf you work in security, incident response, IAM, cloud, backup, or executive leadership, this one is worth your time.Listen, share with like-minded people, and let me know your thoughts. This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit omarrao.substack.com | 28m 06s | ||||||
| 4/23/26 | Episode 10 - SaaS Sprawl, Shadow IT, and the Trust You Already Gave Away | In Episode 10, Omar Rao breaks down why SaaS sprawl is one of the biggest hidden risks in modern enterprise security. With direct ethical hacker advice, technical references, real SaaS examples, and practical controls like CASB, SSPM, OAuth governance, shadow IT discovery, and identity hygiene, this episode explains how convenience-driven app growth quietly turns into serious attack surface.A lot of enterprises think their environment is only what IT approved. That is not reality.The real environment also includes the apps marketing connected, the tools sales adopted, the integrations product enabled, the SaaS platforms HR uses, and the third-party apps nobody reviewed closely enough.In this episode, I break down why SaaS sprawl has become one of the biggest hidden risks in modern cybersecurity and how attackers use app-to-app trust, OAuth grants, service accounts, and shadow IT to move quietly through enterprises.We cover:• Why SaaS sprawl is more than an IT hygiene problem• How shadow IT expands the attack surface• Where OAuth, service accounts, and delegated permissions become dangerous• What teams can do right now with tools like CASB, SSPM, app governance, and stronger identity controlIf you work in security, IAM, cloud, SaaS, or enterprise operations, this episode is worth your time. This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit omarrao.substack.com | 35m 16s | ||||||
| 4/21/26 | Episode 9: Identity, the Modern Battlefield of Cybersecurity | In Episode 9, Omar Rao breaks down why identity is no longer just a login issue. It has become one of the biggest battlefields in modern cybersecurity. From compromised accounts and mailbox abuse to OAuth risk, service accounts, and lateral movement, this episode explains how attackers use trusted identities to move quietly through enterprises and why organizations need to rethink identity as a full compromise path, not just an access control feature.A lot of organizations still treat identity like a login problem. That is old thinking.In this episode, I break down why identity is now one of the biggest battlefields in cybersecurity and how one compromised account can quietly turn into privilege abuse, SaaS exposure, lateral movement, and enterprise-wide risk.We cover:• Why identity is more than authentication• How attackers use trust to move through enterprises• Where OAuth, service accounts, and mailbox access become dangerous• What enterprises should focus on right now to reduce identity riskIf you work in security, IAM, cloud, SaaS, help desk, or leadership, this episode is worth your time. This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit omarrao.substack.com | 30m 15s | ||||||
| 4/20/26 | Episode 8 - Cyber Fatigue, Alert Overload | In this episode, Omar Rao breaks down one of the least discussed but most damaging issues in cybersecurity today: overload. Security teams are flooded with alerts, dashboards, tools, tickets, pressure, and constant urgency. Even good teams can start making bad decisions when the volume gets too high and the workflow gets too messy. This episode explains why cyber fatigue is becoming a real security risk, how alert overload breaks defenders down, and what leaders need to do if they want stronger security operations instead of just noisier ones.We break down how alert overload, constant urgency, weak workflows, and analyst fatigue create real security risk. Even strong teams can start missing things when the environment becomes too noisy and too fragmented.We cover:• Why alert overload is dangerous, not just annoying• How fatigue changes security outcomes• What attackers understand about defender overload• What leaders should do to build stronger security operationsA strong listen for security leaders, SOC teams, founders, CISOs, operators, and anyone responsible for building resilient cyber defense. This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit omarrao.substack.com | 28m 39s | ||||||
| 4/17/26 | Episode 7 - Cyber Resilience in the Boardroom | In this episode, Omar Rao breaks down why cyber resilience is no longer only a security team issue. It is a leadership issue. When a serious cyber incident happens, the quality of executive thinking, communication, and decision-making can shape the outcome as much as the tools on the screen. This episode explains what leaders often get wrong during cyber crises, how strong organizations respond under pressure, and what real cyber resilience looks like when the goal is not only to detect the threat, but to keep the business moving.We break down how executives, boards, and business leaders should think during a live cyber event, where decision-making often goes wrong, and what real cyber resilience looks like when the goal is not just to detect the threat, but to keep the business moving.We cover:• Why cyber incidents are leadership events, not just technical events• What executives still get wrong under pressure• What strong decision-making looks like during crisis• How boards should think about cyber resilience in a more useful wayA strong listen for founders, executives, CISOs, operators, board members, and teams focused on resilience and real-world security leadership. This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit omarrao.substack.com | 33m 58s | ||||||
| 4/16/26 | Episode 6 - Deepfakes and Deceptions | In this episode, Omar Rao breaks down one of the fastest-growing problems in cybersecurity today: attackers are no longer just targeting systems, they are targeting trust. From cloned voices and fake executive messages to AI-enhanced impersonation and pressure-based fraud, this episode explains how deepfakes and social engineering are evolving, why businesses are more exposed than they realize, and what security teams and leaders need to do before the next attack sounds exactly like someone they trust.We break down how deepfakes, cloned voices, executive impersonation, and AI-enhanced deception are changing the way attackers target businesses. The real risk is no longer just technical compromise. It is pressure, urgency, authority, and human decision-making under stress.We cover:• Why the human attack surface is growing fast• How executive impersonation and deepfake-style attacks work• Where businesses are most exposed• What leaders, finance teams, help desks, and security teams should do nowIf your organization still thinks social engineering starts and ends with phishing emails, this episode will change the way you look at cyber risk.Listen, share with like-minded people, and let me know your thoughts. This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit omarrao.substack.com | 34m 40s | ||||||
| 4/15/26 | Episode 5 - AI and the Acceleration of Adversaries | In this episode, Omar Rao breaks down how AI is changing cybersecurity on both sides of the fight. Attackers are using it to move faster, scale phishing, improve reconnaissance, and create more convincing deception. Defenders can use it too, but only if they stop treating AI like a buzzword and start using it as an operational advantage. This episode covers how AI is accelerating threats, where DSPM fits into modern defense, and what real security teams should do now to reduce exposure before speed becomes the attacker’s biggest advantage.Attackers are using it to scale phishing, improve reconnaissance, and move faster through noisy environments. Defenders can use it too, but only if AI is tied to real operational value.We cover:• How AI helps attackers move faster• Good AI use cases for defenders• Why DSPM matters in the AI era• What leaders and security teams should do nowA strong listen for security leaders, engineers, founders, analysts, and teams focused on cyber resilience. This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit omarrao.substack.com | 40m 43s | ||||||
| 4/14/26 | Episode 4 - OT Under Pressure | In this episode, Omar Rao breaks down why operational technology is no longer a niche topic reserved for utilities and industrial plants. OT now sits at the center of some of the most serious cyber risks in the world because attacks against these systems can move beyond data loss and into real operational disruption. Using practical examples, this episode explains what OT is, why it is different from traditional IT, how vendor access and weak segmentation increase risk, and what organizations need to do before a cyber incident becomes a real-world problem. This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit omarrao.substack.com | 35m 31s | ||||||
| 4/13/26 | Episode 3 - Inside the Supply Chain | In this episode, Omar Rao breaks down how attackers are no longer limited to targeting companies directly. Instead, they are compromising the software, tools, vendors, and automation workflows organizations already trust. Using real-world style examples, this episode explains how supply chain attacks happen, why they are difficult to detect, and what security teams, leaders, and developers need to do before trusted software becomes the path to a serious breach. This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit omarrao.substack.com | 32m 19s | ||||||
| 4/10/26 | Episode 2 - Cloud Identity Warfare | In Episode 2, Omar breaks down how cloud identity has become one of the fastest-growing attack paths in cybersecurity. From stolen credentials and token abuse to malicious app trust and privilege escalation, this episode explains how one compromised identity can quietly turn into a much larger incident. If you want to understand where modern defenders are losing visibility and what your organization should do next, this episode is worth your time. This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit omarrao.substack.com | 37m 52s | ||||||
Want analysis for the episodes below?Free for Pro Submit a request, we'll have your selected episodes analyzed within an hour. Free, at no cost to you, for Pro users. | |||||||||
| 4/9/26 | Episode 1 - The New Cyber Battlefield | In this first episode, Omar Rao breaks down why today’s biggest cyber risks are no longer limited to stolen data or phishing emails. From operational technology and critical infrastructure to cloud identity abuse and software supply chain compromise, this episode explains how modern attacks are becoming faster, more disruptive, and more dangerous in the real world. You will hear what these threats mean, why they matter now more than ever, and the practical actions organizations should take before a small weakness turns into a major incident. This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit omarrao.substack.com | 42m 30s | ||||||
| 10/10/25 | Hacked and Unfiltered | Episode 1 - Hacked and Unfiltered - Don’t forget to like, share and subscribe! This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit omarrao.substack.com | 6m 48s | ||||||
Showing 12 of 12
Sponsor Intelligence
Sign in to see which brands sponsor this podcast, their ad offers, and promo codes.
Chart Positions
1 placement across 1 market.
Chart Positions
1 placement across 1 market.












