Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
…
continue reading
Jack Rhysider Podcasts
I'm fascinated by what happens in the dark parts of the Internet. Come with me and let's shine some light on it and see what's there.
…
continue reading
"What the Hack?" is the award-winning true cybercrime podcast--the place to hear memorable stories and get good advice.
…
continue reading
Ann Johnson, Corporate Vice President and Deputy Chief Information Security Officer at Microsoft, talks with cybersecurity thought leaders and influential industry experts about the trends shaping the cyber landscape and what should be top-of-mind for the C-suite and other key decision makers. Ann and her guests explore the risk and promise of emerging technologies, as well as the impact on how humans work, communicate, consume information, and live in this era of digital transformation. Ple ...
…
continue reading
Empowering Your IT Career Journey – From the first step to success! With a passion for technology and a mission to uplift others, I’m here to guide you through the dynamic IT industry. Whether you're just starting or looking to advance, you’ve found a community dedicated to your growth. Advice & Insights: From Help Desk to Director of Network Operations in 3 years, I share strategies to fast-track your career. Expert Conversations: Gain exclusive insights from industry leaders. Let’s make IT ...
…
continue reading
Cybersecurity careers, education, resources, and more with Gotham Sharma.
…
continue reading
Conversation hosted by writer, technologist and award-winning music producer Giulio "Julyo" D'Agostino with friends and guests that include hackers, artists, entrepreneurs, celebrities and beyond.
…
continue reading
The founders of Chartable discuss all things podcasting, interview podcasters and dish the best advice on how to market and grow your podcast.
…
continue reading
The podcast that brings you the very best in all things, cybersecurity, taking an in-depth look at the most pressing issues and trends across the industry. Connect with us on our LinkedIn page! - https://www.linkedin.com/company/security-masterminds-podcast/
…
continue reading
We are a group of friends that have worked in Public Safety in one way or another for most of our lives. We have long talked about starting a podcast to cover those things that not many shows will talk about. We also want to talk about and share our personal experiences with others in the hope that maybe we can help them learn from our experiences.
…
continue reading
Welcome to Buzzsprout Conversations, the show where we dive into the real-life stories of podcasters in the middle of their podcasting journey. You'll hear stories from famous podcasters as well as everyday podcasters, just like you, share stories about how podcasting has impacted them and the things they've learned.
…
continue reading
Every week, we take a bite-sized look at legal and economic developments in locales around the world as we try to decipher global trends in law and business with the help of our international guests. No topic is too big, too small, too simple, or too complicated. We plan to cover continents, countries, regimes, governance, finances, legal developments, and whatever is trending on Twitter. Connect with us: - https://twitter.com/globallawbiz - https://www.linkedin.com/company/harris-bricken - ...
…
continue reading

1
He Was Arrested as a Russian Hacker, But The Truth Is Far Scarier ☠ Darknet Diaries Ep. 163: Ola
1:22:58
1:22:58
Play later
Play later
Lists
Like
Liked
1:22:58In 2019, Ola Bini, a Swedish programmer and privacy advocate, was arrested in Ecuador with no evidence and no motive. But what's really going on goes far deeper than he could imagine. Visit https://darknetdiaries.com/episode/163/ for a list of sources, full transcripts, and to listen to all episodes. ... https://www.youtube.com/watch?v=4xnX9tQtk2A…
…
continue reading

1
Episode 218: The Data Grift Everyone Missed
50:25
50:25
Play later
Play later
Lists
Like
Liked
50:25Every click, swipe, and post fuels the data economy. Credit cards, apps, even maps—our lives are scraped, stitched, and sold. It feels like a heist, and sometimes it is. Identity Theft Resource Center CEO Eva Velazquez insists the picture isn’t entirely bleak. This week we talk about the good, the bad, and the ugly of data brokers. Learn more about…
…
continue reading

1
102: Watch This BEFORE Starting In Cybersecurity
52:35
52:35
Play later
Play later
Lists
Like
Liked
52:35Meter: Visit https://meter.com/itcareer to book a demo To be competitive, it's important to focus on continuous education to improve your cyber security skills. This video provides career advice and tips for career development, especially regarding the skills for cybersecurity that employers are looking for. We also share some insightful resume tip…
…
continue reading

1
101: An Unfiltered Conversation with John Hammond
53:02
53:02
Play later
Play later
Lists
Like
Liked
53:02Meter: Visit meter.com/itcareer to book a demo How do you go from curious about hacking to becoming one of the most recognized names in cybersecurity? In this episode of the I.T. Career Podcast, I sit down with John Hammond to unpack his real story—how he broke into security, the big moments that shaped his career, and the lessons he’d share with a…
…
continue reading
Matt Rowe, Chief Security Officer at Lloyds Bank, joins Ann on this week's episode of Afternoon Cyber Tea to explore the future of cybersecurity. They discuss the accelerating pace of change in the industry, from AI and automation to data-driven security practices and identity management. Matt shares how Lloyds Bank is modernizing its approach by r…
…
continue reading
It started with a slow roll of weird emails and phone calls. And then award-winning filmmaker Dan Sturman found himself in the crosshairs of serious hackers. With parallels to another case of mistaken identity and an assist from security expert Reuben Moretz, this week we explore bad social engineering. Learn more about your ad choices. Visit megap…
…
continue reading

1
The Hidden Side of Cybersecurity You Can’t Ignore
52:43
52:43
Play later
Play later
Lists
Like
Liked
52:43Meter: Visit https://meter.com/itcareer to book a demoCybersecurity is changing faster than ever — and the jobs of the future may not look like the ones you picture today. Everyone talks about hacking, red teaming, and pen testing, but there’s a side of cybersecurity that’s just as critical and often overlooked: GRC (Governance, Risk, and Complianc…
…
continue reading

1
Episode 216: Who’s Watching the Watchers?
47:14
47:14
Play later
Play later
Lists
Like
Liked
47:14Feeling watched? Join us as Vermont Attorney General Charity Clark breaks down the new reality of digital surveillance. From school apps to AI scams, we dive into how companies collect your data and how to take control of your online privacy. The war for privacy is real—and it's a fight you can't afford to lose. Learn more about your ad choices. Vi…
…
continue reading

1
100: I Became an IT Director with ZERO Degree or Certs
26:11
26:11
Play later
Play later
Lists
Like
Liked
26:11Meter: Visit https://meter.com/ITCAREER to book a demoSeven years ago, I was sitting in the cab of a bulldozer at a pulp mill, covered in dust, thinking: “Is this really my future?”Three years later, I was the Director of Network Operations at a fiber ISP, earning six figures — without a degree, without certifications, and without prior IT job expe…
…
continue reading

1
From Bottlenecks to Breakthroughs: Aligning Legal and Security Teams
39:06
39:06
Play later
Play later
Lists
Like
Liked
39:06Erez Liebermann, partner at Debevoise & Plimpton and a leading voice in cybersecurity and data privacy joins Ann on this week's episode of Afternoon Cyber Tea. Together, they unpack how legal and security teams can act as strategic partners, aligning regulatory compliance with business priorities while preparing for and responding to incidents. Ere…
…
continue reading
In 2019, Ola Bini, a Swedish programmer and privacy advocate, was arrested in Ecuador for being a Russian hacker. Find Ola on X: https://x.com/olabini. Or visit his website https://olabini.se/blog/. Or check out his non-profit https://autonomia.digital/. Sponsors Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint…
…
continue reading

1
Episode 215: They Targeted His Mom, He Went Full CIA
43:41
43:41
Play later
Play later
Lists
Like
Liked
43:41A fake Microsoft pop-up cost Ken Westbrook’s mom her life savings. But they scammed the wrong family. Westbrook is former CIA. These days he’s sounding the alarm on how foreign crime rings steal billions from Americans with smishing campaigns, scareware, and gift cards. We talked about solutions. Learn more about your ad choices. Visit megaphone.fm…
…
continue reading

1
Episode 214: DEF CON Redux with Rachel Tobac!
38:14
38:14
Play later
Play later
Lists
Like
Liked
38:14In this second installment of our DEF CON two-parter, we talked to SocialProof Security CEO Rachel Tobac about how and why people are often the weakest link in so many cybersecurity protocols and how making yourself a harder target will cause most threat actors to move on to an easier mark. Learn more about your ad choices. Visit megaphone.fm/adcho…
…
continue reading

1
The Psychology of Speaking Up with Amy Edmondson
32:17
32:17
Play later
Play later
Lists
Like
Liked
32:17Amy Edmondson, Harvard Business School professor and psychological safety pioneer joins Ann on this week's episode of Afternoon Cyber Tea. Together they discuss how creating psychologically safe environments allows teams, especially in high-pressure fields like cybersecurity, to speak up about early warnings, embrace the red, and learn from failure…
…
continue reading

1
Episode 213: Inside DEF CON’s Social Engineering Village
41:34
41:34
Play later
Play later
Lists
Like
Liked
41:34At DEF CON’s Social Engineering Village, contestants have 22 minutes to charm real employees at real companies into revealing real details that could lead to a breach. We step inside the booth to see how persuasion, improv, and psychology fuel both ethical hacking and the rise of cybercrime worldwide. Learn more about your ad choices. Visit megapho…
…
continue reading

1
Bonus: What They Don’t Tell You About DEFCON
9:10
9:10
Play later
Play later
Lists
Like
Liked
9:10Dive deeper with Snow Goat — the free hands-on lab that inspired this video. https://hubs.ly/Q03CSkb80 Plus, check out the Varonis blog for real-world cybersecurity insights https://hubs.ly/Q03CShBG0DEF CON isn’t just a hacker conference — it’s a chaotic, creative, overwhelming, and wildly inspiring deep dive into everything cybersecurity. From pac…
…
continue reading

1
Episode 212: How to Talk to a Cybercriminal
42:39
42:39
Play later
Play later
Lists
Like
Liked
42:39Kurtis Minder knows the dark web better than most—and he’s not just watching from the sidelines. As a ransomware negotiator, he’s helped victims talk their way out of seemingly impossible situations. This week, we explore how cybercriminals operate, what makes them tick, and what you need to know to avoid becoming their next target. Learn more abou…
…
continue reading

1
Nasrin Rezai on the Frontlines of Cybersecurity
29:00
29:00
Play later
Play later
Lists
Like
Liked
29:00Nasrin Rezai, SVP and CISO at Verizon joins Ann on this week's episode of Afternoon Cyber Tea. Nasrin shares practical defense strategies for hard-to-secure legacy systems, emphasizes the importance of zero trust, and explains why cybersecurity is now a matter of national defense. Despite the challenges, she closes with optimism, believing that inn…
…
continue reading

1
These 8 Companies You've Never Heard Of Sell Your Personal Data to the Cops 🚨 Ep. 162: Hieu
1:33:57
1:33:57
Play later
Play later
Lists
Like
Liked
1:33:57Before he even graduated high school, Hieu Minh Ngo had stolen 100,000 credit cards. But that was just the beginning of his hacking career. When he stumbled into the terrifying (and perfectly legal) world of data brokers, he built a pipeline for identity theft on a massive scale. But why are these companies even allowed to exist? And who are they s…
…
continue reading
All Hieu Minh Ngo wanted was to make money online. But when he stumbled into the dark web, he found more than just opportunity, he found a global dark market. What started as a side hustle turned into an international crime spree. Find Hieu on X: https://x.com/HHieupc. Sponsors Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero…
…
continue reading

1
Episode 211: The Coldplay Couple and the End of Anonymity
33:36
33:36
Play later
Play later
Lists
Like
Liked
33:36A not-entirely innocent moment at a concert set the internet on fire. But what if that was just a symptom of a bigger problem? New York Times journalist Kashmir Hill, author of Your Face Belongs to Us, helps us explore the chilling reality of ambient surveillance, and how facial recognition could be the end privacy as we know it. Learn more about y…
…
continue reading

1
Encore: Hugh Thompson on Building the RSA Conference
37:34
37:34
Play later
Play later
Lists
Like
Liked
37:34Please enjoy this encore episode of Afternoon Cyber Tea while Ann Johnson and team are taking a break. Dr. Hugh Thompson, Executive Chairman of RSA Conference and Managing Partner at Crosspoint Capital joins Ann on this week's episode of Afternoon Cyber Tea. They discuss what goes into planning the world’s largest cybersecurity conference—from the…
…
continue reading

1
Episode 210: Cracking the Code of Fraud with AARP's Kathy Stokes
44:39
44:39
Play later
Play later
Lists
Like
Liked
44:39Online fraud isn't just annoying; it's a national crisis. Last year alone, it may have siphoned $158 billion from the U.S. economy. This episode features AARP's Kathy Stokes, who reveals how fraud has morphed into a sophisticated, global operation and what's being done to fight back against this evolving threat. Learn more about your ad choices. Vi…
…
continue reading

1
Episode 209: Unmasking the North Korean IT Scam
42:29
42:29
Play later
Play later
Lists
Like
Liked
42:29Fortune Magazine's Amanda Gerut offers a deep dive into the secret army of remote IT workers funding North Korea's nuclear ambitions. Explore the hidden world of laptop farms, the criminal identity theft targeting freelancers, and the shocking human cost. It's a chilling scheme with law enforcement and freelancers trapped in the crossfire. Learn mo…
…
continue reading

1
You'll Never Trust Another USB Cable After Hearing This 🐍 Darknet Diaries | Ep. 161: MG
1:11:58
1:11:58
Play later
Play later
Lists
Like
Liked
1:11:58What if a USB cable could take complete control of your PC or phone? Hackers use them. Governments are using them. And it's all thanks to one security pro known only as "MG." Visit https://darknetdiaries.com/episode/161/ for a list of sources, full transcripts, and to listen to all episodes. ... https://www.youtube.com/watch?v=W81oWOf_RiE…
…
continue reading

1
Encore: Cybercrime and Storytelling with Jack Rhysider
32:18
32:18
Play later
Play later
Lists
Like
Liked
32:18Please enjoy this encore episode of Afternoon Cyber Tea while Ann Johnson and team are taking a break. Jack Rhysider, the creator and host of cybersecurity podcast Darknet Diaries joins Ann on this week's episode of Afternoon Cyber Tea. Jack shares his journey from network security engineer to self-taught storyteller, detailing how his passion for …
…
continue reading
In this episode we talk with mg (https://x.com/MG), the brilliant (and notorious) hacker and hardware engineer behind the OMG Cable. A seemingly ordinary USB cable with extraordinary offensive capabilities. Learn more about mg at: o.mg.lol Sponsors Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Pla…
…
continue reading
Join Ben Winters, director of AI and Privacy at the Consumer Federation of America, for a front-row seat to the chaotic world of AI regulation where dirty data, aggressive lobbying, and public confusion drive a "winner takes all" vibe. From shady therapy bots to data-fueled discrimination, Ben reveals the urgent need to create guardrails for AI bef…
…
continue reading

1
Episode 207: Kristen and the Phantom Puppy
34:17
34:17
Play later
Play later
Lists
Like
Liked
34:17Kristin got scammed because she didn't want to give a puppy mill her business. This classic digital scam has it all: fake breeders, phony shipping agents, and a non-existent air-conditioned crate. Kristen reveals how her scammers used trust, urgency and emotion, to close the deal. Listen to her story and what you can do to avoid getting duped yours…
…
continue reading

1
They Hired Me to Steal a Shopping Cart Full of Human DNA 🧬 Darknet Diaries Ep. 160: Greg
1:37:59
1:37:59
Play later
Play later
Lists
Like
Liked
1:37:59Greg Linares (AKA Laughing Mantis) shares his hunts for Zero Day exploits, the triple(?) agent working at Microsoft, how he became the youngest hacker ever arrested in Arizona, and that time a client hired him to steal human DNA. Follow Greg on Twitter: https://x.com/Laughing_Mantis. Visit https://darknetdiaries.com/episode/160 for a list of source…
…
continue reading

1
99: An Unfiltered Conversation with Network Chuck
1:03:01
1:03:01
Play later
Play later
Lists
Like
Liked
1:03:01In this episode of the IT Career Podcast, I sit down with Network Chuck for a raw, unfiltered conversation about tech, career growth, burnout, content creation, certifications, and the real behind-the-scenes life of one of YouTube’s biggest tech creators.Whether you're just starting your IT journey or you're a seasoned professional, this episode is…
…
continue reading

1
Machine-Scale Defense and the Future of Cybersecurity
29:50
29:50
Play later
Play later
Lists
Like
Liked
29:50Jeetu Patel, President and Chief Product Officer at Cisco, joins Ann on this week's episode of Afternoon Cyber Tea to explore how artificial intelligence is reshaping the cybersecurity landscape. Jeetu shares insights on the urgent need for machine-scale defenses, the potential for defenders to finally tip the scale against attackers, and the impor…
…
continue reading
Greg Linares (AKA Laughing Mantis) joins us to tell us about how he became the youngest hacker to be arrested in Arizona. Follow Greg on Twitter: https://x.com/Laughing_Mantis. Sponsors Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. …
…
continue reading

1
Episode 206: Chris Hutchins’s Travel Hacking Gets Hacked
42:55
42:55
Play later
Play later
Lists
Like
Liked
42:55If you have never listened to Chris Hutchins explain how to get free travel, you’ve probably been paying too much for your vacations. Turns out, a threat actor was listening to him and stole his miles. Download this week’s episode to hear how he hacked the situation to score even more points. (This episode originally airdropped September 26, 2022.)…
…
continue reading