About this episode
Send a textMost cybersecurity stories talk about the hacks, but this episode peels back the curtain on the raw, unfiltered journey of a hacker turned industry pioneer. Jason Haddix shares how his early days of hex editing and fake IDs evolved into leading offensive security at Fortune 100 giants — all driven by relentless curiosity and defiance. His tales of surviving the shadowy underground, navigating multi-year career pivots, and turning obsession into innovation will blow your mind. This isn’t just about tech — it’s about fearlessly forging a path in a chaotic, ever-changing world where knowledge is power and resilience is everything.You'll discover the secret frameworks behind modern pen testing—like the Bug Hunters Methodology—and how cutting-edge tools are reshaping cybersecurity. Jason dives into his real-world battles: from bypassing the most sophisticated security measures to hacking into critical infrastructure under intense pressure. His insights reveal the brutal truths of red teaming, physical infiltration, and the mental grit required to succeed when everyone else doubts you.We break down the rise of AI and LLMs in security: how attackers jailbreak systems, bypass defenses with prompt injections, and weaponize new technologies faster than security teams can respond. Jason warns about deploying these powerful tools without enough guardrails or understanding — and how FOMO is fueling a wild, unsecured frontier. His perspective is a call to arms for defenders and hackers alike: adapt fast, think boldly, and stay one step ahead in the most dangerous cyber game yet.This episode is essential for anyone hungry to understand the raw reality of offensive security, the future of AI in hacking, and the relentless pursuit of mastery in a digital battlefield. Whether you're a seasoned pro, a curious newcomer, or a business leader, Jason’s fearless authenticity will challenge your assumptions and ignite your passion to innovate. Hit play — your fight for security starts now.Chapters00:00 Introduction and Background in Cybersecurity06:05 Early Experiences and Learning in Cybersecurity12:14 Transitioning to Professional Penetration Testing18:30 Challenges and Realities of Consulting in Cybersecurity20:41 Phishing Tests and Their Consequences23:09 Transitioning to Entrepreneurship26:05 The Evolution of Training and Consulting31:18 The Role of AI in Cybersecurity39:11 Navigating AI Security Challenges39:11 Understanding LLMs and User Education41:42 Privacy Concerns and Risk Management in AI44:32 Prompt Engineering Vulnerabilities and Jailbreaking Techniques47:03 Security Challenges in AI Systems49:39 Future of AI and Community EngagementSupport the show