Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
…
continue reading
Jack Rhysider Podcasts
I'm fascinated by what happens in the dark parts of the Internet. Come with me and let's shine some light on it and see what's there.
…
continue reading
"What the Hack?" is the award-winning true cybercrime podcast--the place to hear memorable stories and get good advice.
…
continue reading
The Watchers is a profile in the people who are looking out for the rest of us. From national security to cybersecurity, regulators to military operators, these are the people who are on the wall for us.
…
continue reading
Ann Johnson, Corporate Vice President and Deputy Chief Information Security Officer at Microsoft, talks with cybersecurity thought leaders and influential industry experts about the trends shaping the cyber landscape and what should be top-of-mind for the C-suite and other key decision makers. Ann and her guests explore the risk and promise of emerging technologies, as well as the impact on how humans work, communicate, consume information, and live in this era of digital transformation. Ple ...
…
continue reading
Cybersecurity careers, education, resources, and more with Gotham Sharma.
…
continue reading
Conversation hosted by writer, technologist and award-winning music producer Giulio "Julyo" D'Agostino with friends and guests that include hackers, artists, entrepreneurs, celebrities and beyond.
…
continue reading
The founders of Chartable discuss all things podcasting, interview podcasters and dish the best advice on how to market and grow your podcast.
…
continue reading
Welcome to Buzzsprout Conversations, the show where we dive into the real-life stories of podcasters in the middle of their podcasting journey. You'll hear stories from famous podcasters as well as everyday podcasters, just like you, share stories about how podcasting has impacted them and the things they've learned.
…
continue reading
Every week, we take a bite-sized look at legal and economic developments in locales around the world as we try to decipher global trends in law and business with the help of our international guests. No topic is too big, too small, too simple, or too complicated. We plan to cover continents, countries, regimes, governance, finances, legal developments, and whatever is trending on Twitter. Connect with us: - https://twitter.com/globallawbiz - https://www.linkedin.com/company/harris-bricken - ...
…
continue reading
1
Jack Rhysider on Darknet Diaries, Privacy, and the Future of Cybersecurity
1:20:43
1:20:43
Play later
Play later
Lists
Like
Liked
1:20:43Jack Rhysider, creator of Darknet Diaries, joins The Watchers to talk privacy, hacking culture, and the evolving threats shaping our digital lives. From disguises at DEFCON to exploring hacker origins in video games, Jack shares insights on why breaches are inevitable, how underground communities evolve, and where optimism fits in the face of AI, n…
…
continue reading
1
"I was addicted to making money." Confessions of a Chronic Card Skimmer 💳 Ep. 164: Oak Cliff Swipers
1:28:04
1:28:04
Play later
Play later
Lists
Like
Liked
1:28:04By Jack Rhysider
…
continue reading
1
The Power of Converged Security in a Connected World
46:19
46:19
Play later
Play later
Lists
Like
Liked
46:19Darren Kane, Chief Security Officer at NBN, Australia’s national broadband network joins Ann on this week's episode of Afternoon Cyber Tea to shares insights from his unique journey through law enforcement, financial enforcement, and corporate security, and how those experiences shaped his leadership of a converged security organization that unites…
…
continue reading
1
Episode 223: How to Make Your House Invisible
41:11
41:11
Play later
Play later
Lists
Like
Liked
41:11When scammers tried to steal Graceland, it seemed like a fluke, but deed fraud is very much on the rise. Del Denney of the Land Trust Company explains how criminals steal homes and how to stop it from happening to you. Plus, we revisit Adam Levin's wallet ripper about a twice-targeted beachfront property. Learn more about your ad choices. Visit meg…
…
continue reading
1
Jennifer Ewbank on the CIA, Innovation in AI, and the Race with China
1:08:35
1:08:35
Play later
Play later
Lists
Like
Liked
1:08:35Jennifer Ewbank, former Deputy Director of the CIA for Digital Innovation, joins The Watchers to discuss the intersection of espionage and emerging technology. From her decades in the field to leading the Agency’s digital transformation, she shares insights on the race with China in AI, the challenges of intelligence in a sensor-rich world, and the…
…
continue reading
1
Episode 222: Heather Barnhart Hunts Digital Ghosts
50:18
50:18
Play later
Play later
Lists
Like
Liked
50:18Forensic expert Heather Barnhart (SANS Institute) decoded Osama Bin Laden's phones and helped convict quadruple murderer Brian Kohberger. Learn how surviving her own harassment fueled her mission, plus the digital "pattern of life" hack and simple steps to combat AI deepfakes and stay safe online. Learn more about your ad choices. Visit megaphone.f…
…
continue reading
1
From Silos to Solutions: Building Trust Through Transparent Cybersecurity Communications with Microsoft's Frank Shaw
28:50
28:50
Play later
Play later
Lists
Like
Liked
28:50Frank X. Shaw, Chief Communications Officer at Microsoft, joins Ann on this week's episode of Afternoon Cyber Tea to explore the critical role of communication in cybersecurity. They discuss how transparency and trust shape effective response to cyber incidents, the importance of breaking down silos across teams, and how AI is transforming communic…
…
continue reading
1
Episode 221: Seth Godin's Anti-Spam Playbook: Be Awesome
44:29
44:29
Play later
Play later
Lists
Like
Liked
44:29Marketing visionary Seth Godin explains how the Internet got hijacked by an attention-stealing spam economy that keeps us in an endless loop of badly targeted marketing. Godin's anti-spam playbook: demand companies earn your attention with awesomeness, and break the digital slop loop that broke the Internet. Learn more about your ad choices. Visit …
…
continue reading
1
Episode 220: The $5,000 Mistake: Inside a Facebook Scam
45:18
45:18
Play later
Play later
Lists
Like
Liked
45:18By DeleteMe
…
continue reading
By Jack Rhysider
…
continue reading
1
Tatyana Bolton on Cyber Policy, OT Security, and the Speed of Relevance
1:42:02
1:42:02
Play later
Play later
Lists
Like
Liked
1:42:02In this episode of The Watchers, Andy Sauer sits down with cybersecurity leader Tatyana Bolton. From her unexpected start in acting to shaping national policy at CISA, Google, and beyond, Tatyana shares her perspective on why U.S. cyber defenses must keep pace with adversaries moving at the “speed of relevance.” They discuss policy gridlock, supply…
…
continue reading
1
Lessons from the Frontlines of Industrial Security
37:55
37:55
Play later
Play later
Lists
Like
Liked
37:55Volker Wagner, Chief Information Security Officer at BASF, joins Ann on this week's episode of Afternoon Cyber Tea to talk shop on what it really takes to defend one of the world’s largest chemical companies. From his early days in auditing to leading global cyber for high-stakes industrial and research environments, Volker shares battle-tested ins…
…
continue reading
2551
Episode 219: 3 Ways Not to Lose Everything
43:46
43:46
Play later
Play later
Lists
Like
Liked
43:46Former federal prosecutor Tom O’Malley takes us inside the strange, high-stakes world of modern fraud—where victims are presumed guilty, families lose fortunes, and the fight against global crime rings starts at home. Three lessons that could make a difference. Voting: https://vote.signalaward.com/PublicVoting?utm_campaign=signal4_finalists_finalis…
…
continue reading
3151
Episode 218: The Data Grift Everyone Missed
50:25
50:25
Play later
Play later
Lists
Like
Liked
50:25Every click, swipe, and post fuels the data economy. Credit cards, apps, even maps—our lives are scraped, stitched, and sold. It feels like a heist, and sometimes it is. Identity Theft Resource Center CEO Eva Casey-Velasquez insists the picture isn’t entirely bleak. This week we talk about the good, the bad, and the ugly of data brokers. Learn more…
…
continue reading
Matt Rowe, Chief Security Officer at Lloyds Bank, joins Ann on this week's episode of Afternoon Cyber Tea to explore the future of cybersecurity. They discuss the accelerating pace of change in the industry, from AI and automation to data-driven security practices and identity management. Matt shares how Lloyds Bank is modernizing its approach by r…
…
continue reading
It started with a slow roll of weird emails and phone calls. And then award-winning filmmaker Dan Sturman found himself in the crosshairs of serious hackers. With parallels to another case of mistaken identity and an assist from security expert Reuben Moretz, this week we explore bad social engineering. Learn more about your ad choices. Visit megap…
…
continue reading
1
Gentry Lane on cyber weapons, national defense, and the race for global cyber power
1:37:22
1:37:22
Play later
Play later
Lists
Like
Liked
1:37:22Cybersecurity strategist Gentry Lane joins The Watchers to unpack why cyber weapons should be treated as real weapons of war. She and Andy Sauer dive into the absence of a national cyber strategy, the vulnerabilities of America’s critical infrastructure, and the role of Europe in the global cyber power race. From the dangers of supply chain weaknes…
…
continue reading
1
Episode 216: Who’s Watching the Watchers?
47:14
47:14
Play later
Play later
Lists
Like
Liked
47:14Feeling watched? Join us as Vermont Attorney General Charity Clark breaks down the new reality of digital surveillance. From school apps to AI scams, we dive into how companies collect your data and how to take control of your online privacy. The war for privacy is real—and it's a fight you can't afford to lose. Learn more about your ad choices. Vi…
…
continue reading
1
From Bottlenecks to Breakthroughs: Aligning Legal and Security Teams
39:06
39:06
Play later
Play later
Lists
Like
Liked
39:06Erez Liebermann, partner at Debevoise & Plimpton and a leading voice in cybersecurity and data privacy joins Ann on this week's episode of Afternoon Cyber Tea. Together, they unpack how legal and security teams can act as strategic partners, aligning regulatory compliance with business priorities while preparing for and responding to incidents. Ere…
…
continue reading
1
He Was Arrested as a Russian Hacker, But The Truth Is Far Scarier ☠ Darknet Diaries Ep. 163: Ola
1:22:58
1:22:58
Play later
Play later
Lists
Like
Liked
1:22:58In 2019, Ola Bini, a Swedish programmer and privacy advocate, was arrested in Ecuador with no evidence and no motive. But what's really going on goes far deeper than he could imagine. Visit https://darknetdiaries.com/episode/163/ for a list of sources, full transcripts, and to listen to all episodes. ... https://www.youtube.com/watch?v=4xnX9tQtk2A…
…
continue reading
In 2019, Ola Bini, a Swedish programmer and privacy advocate, was arrested in Ecuador for being a Russian hacker. Find Ola on X: https://x.com/olabini. Or visit his website https://olabini.se/blog/. Or check out his non-profit https://autonomia.digital/. Sponsors Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint…
…
continue reading
1
Episode 215: They Targeted His Mom, He Went Full CIA
43:41
43:41
Play later
Play later
Lists
Like
Liked
43:41A fake Microsoft pop-up cost Ken Westbrook’s mom her life savings. But they scammed the wrong family. Westbrook is former CIA. These days he’s sounding the alarm on how foreign crime rings steal billions from Americans with smishing campaigns, scareware, and gift cards. We talked about solutions. Learn more about your ad choices. Visit megaphone.fm…
…
continue reading
1
Episode 214: DEF CON Redux with Rachel Tobac!
38:14
38:14
Play later
Play later
Lists
Like
Liked
38:14In this second installment of our DEF CON two-parter, we talked to SocialProof Security CEO Rachel Tobac about how and why people are often the weakest link in so many cybersecurity protocols and how making yourself a harder target will cause most threat actors to move on to an easier mark. Learn more about your ad choices. Visit megaphone.fm/adcho…
…
continue reading
1
The Psychology of Speaking Up with Amy Edmondson
32:17
32:17
Play later
Play later
Lists
Like
Liked
32:17Amy Edmondson, Harvard Business School professor and psychological safety pioneer joins Ann on this week's episode of Afternoon Cyber Tea. Together they discuss how creating psychologically safe environments allows teams, especially in high-pressure fields like cybersecurity, to speak up about early warnings, embrace the red, and learn from failure…
…
continue reading
1
Episode 213: Inside DEF CON’s Social Engineering Village
41:34
41:34
Play later
Play later
Lists
Like
Liked
41:34At DEF CON’s Social Engineering Village, contestants have 22 minutes to charm real employees at real companies into revealing real details that could lead to a breach. We step inside the booth to see how persuasion, improv, and psychology fuel both ethical hacking and the rise of cybercrime worldwide. Learn more about your ad choices. Visit megapho…
…
continue reading
1
Episode 212: How to Talk to a Cybercriminal
42:39
42:39
Play later
Play later
Lists
Like
Liked
42:39Kurtis Minder knows the dark web better than most—and he’s not just watching from the sidelines. As a ransomware negotiator, he’s helped victims talk their way out of seemingly impossible situations. This week, we explore how cybercriminals operate, what makes them tick, and what you need to know to avoid becoming their next target. Learn more abou…
…
continue reading
1
Nasrin Rezai on the Frontlines of Cybersecurity
29:00
29:00
Play later
Play later
Lists
Like
Liked
29:00Nasrin Rezai, SVP and CISO at Verizon joins Ann on this week's episode of Afternoon Cyber Tea. Nasrin shares practical defense strategies for hard-to-secure legacy systems, emphasizes the importance of zero trust, and explains why cybersecurity is now a matter of national defense. Despite the challenges, she closes with optimism, believing that inn…
…
continue reading
1
These 8 Companies You've Never Heard Of Sell Your Personal Data to the Cops 🚨 Ep. 162: Hieu
1:33:57
1:33:57
Play later
Play later
Lists
Like
Liked
1:33:57Before he even graduated high school, Hieu Minh Ngo had stolen 100,000 credit cards. But that was just the beginning of his hacking career. When he stumbled into the terrifying (and perfectly legal) world of data brokers, he built a pipeline for identity theft on a massive scale. But why are these companies even allowed to exist? And who are they s…
…
continue reading
All Hieu Minh Ngo wanted was to make money online. But when he stumbled into the dark web, he found more than just opportunity, he found a global dark market. What started as a side hustle turned into an international crime spree. Find Hieu on X: https://x.com/HHieupc. Sponsors Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero…
…
continue reading
1
Episode 211: The Coldplay Couple and the End of Anonymity
33:36
33:36
Play later
Play later
Lists
Like
Liked
33:36A not-entirely innocent moment at a concert set the internet on fire. But what if that was just a symptom of a bigger problem? New York Times journalist Kashmir Hill, author of Your Face Belongs to Us, helps us explore the chilling reality of ambient surveillance, and how facial recognition could be the end privacy as we know it. Learn more about y…
…
continue reading
1
Encore: Hugh Thompson on Building the RSA Conference
37:34
37:34
Play later
Play later
Lists
Like
Liked
37:34Please enjoy this encore episode of Afternoon Cyber Tea while Ann Johnson and team are taking a break. Dr. Hugh Thompson, Executive Chairman of RSA Conference and Managing Partner at Crosspoint Capital joins Ann on this week's episode of Afternoon Cyber Tea. They discuss what goes into planning the world’s largest cybersecurity conference—from the…
…
continue reading
1
Episode 210: Cracking the Code of Fraud with AARP's Kathy Stokes
44:39
44:39
Play later
Play later
Lists
Like
Liked
44:39Online fraud isn't just annoying; it's a national crisis. Last year alone, it may have siphoned $158 billion from the U.S. economy. This episode features AARP's Kathy Stokes, who reveals how fraud has morphed into a sophisticated, global operation and what's being done to fight back against this evolving threat. Learn more about your ad choices. Vi…
…
continue reading
1
Episode 209: Unmasking the North Korean IT Scam
42:29
42:29
Play later
Play later
Lists
Like
Liked
42:29Fortune Magazine's Amanda Gerut offers a deep dive into the secret army of remote IT workers funding North Korea's nuclear ambitions. Explore the hidden world of laptop farms, the criminal identity theft targeting freelancers, and the shocking human cost. It's a chilling scheme with law enforcement and freelancers trapped in the crossfire. Learn mo…
…
continue reading
1
Nick Andersen on national resilience, priorities, and leading with purpose
1:38:59
1:38:59
Play later
Play later
Lists
Like
Liked
1:38:59Nick Andersen, President and COO of Invictus, joins Andy Sauer to unpack the hard truths about cybersecurity, critical infrastructure, and government readiness. With experience spanning the Marine Corps, DOE, and White House, Nick offers a brutally honest take on what it will take to build real resilience—starting with ruthless prioritization. From…
…
continue reading
1
You'll Never Trust Another USB Cable After Hearing This 🐍 Darknet Diaries | Ep. 161: MG
1:11:58
1:11:58
Play later
Play later
Lists
Like
Liked
1:11:58What if a USB cable could take complete control of your PC or phone? Hackers use them. Governments are using them. And it's all thanks to one security pro known only as "MG." Visit https://darknetdiaries.com/episode/161/ for a list of sources, full transcripts, and to listen to all episodes. ... https://www.youtube.com/watch?v=W81oWOf_RiE…
…
continue reading
1
Encore: Cybercrime and Storytelling with Jack Rhysider
32:18
32:18
Play later
Play later
Lists
Like
Liked
32:18Please enjoy this encore episode of Afternoon Cyber Tea while Ann Johnson and team are taking a break. Jack Rhysider, the creator and host of cybersecurity podcast Darknet Diaries joins Ann on this week's episode of Afternoon Cyber Tea. Jack shares his journey from network security engineer to self-taught storyteller, detailing how his passion for …
…
continue reading
In this episode we talk with mg (https://x.com/MG), the brilliant (and notorious) hacker and hardware engineer behind the OMG Cable. A seemingly ordinary USB cable with extraordinary offensive capabilities. Learn more about mg at: o.mg.lol Sponsors Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Pla…
…
continue reading