Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
…
continue reading
Jack Rhysider Podcasts
I'm fascinated by what happens in the dark parts of the Internet. Come with me and let's shine some light on it and see what's there.
…
continue reading
"What the Hack?" is the award-winning true cybercrime podcast--the place to hear memorable stories and get good advice.
…
continue reading
The Watchers is a profile in the people who are looking out for the rest of us. From national security to cybersecurity, regulators to military operators, these are the people who are on the wall for us.
…
continue reading
Ann Johnson, Corporate Vice President and Deputy Chief Information Security Officer at Microsoft, talks with cybersecurity thought leaders and influential industry experts about the trends shaping the cyber landscape and what should be top-of-mind for the C-suite and other key decision makers. Ann and her guests explore the risk and promise of emerging technologies, as well as the impact on how humans work, communicate, consume information, and live in this era of digital transformation. Ple ...
…
continue reading
Cybersecurity careers, education, resources, and more with Gotham Sharma.
…
continue reading
Conversation hosted by writer, technologist and award-winning music producer Giulio "Julyo" D'Agostino with friends and guests that include hackers, artists, entrepreneurs, celebrities and beyond.
…
continue reading
The founders of Chartable discuss all things podcasting, interview podcasters and dish the best advice on how to market and grow your podcast.
…
continue reading
Welcome to Buzzsprout Conversations, the show where we dive into the real-life stories of podcasters in the middle of their podcasting journey. You'll hear stories from famous podcasters as well as everyday podcasters, just like you, share stories about how podcasting has impacted them and the things they've learned.
…
continue reading
Every week, we take a bite-sized look at legal and economic developments in locales around the world as we try to decipher global trends in law and business with the help of our international guests. No topic is too big, too small, too simple, or too complicated. We plan to cover continents, countries, regimes, governance, finances, legal developments, and whatever is trending on Twitter. Connect with us: - https://twitter.com/globallawbiz - https://www.linkedin.com/company/harris-bricken - ...
…
continue reading
1
"The Building Has Malware." Adventures in Appsec 🕷 Darknet Diaries Ep. 165: Tanya
47:44
47:44
Play later
Play later
Lists
Like
Liked
47:44Tanya Janca's worldview changed suddenly when she realized how easy it was for hackers to crack her applications. From that point on, she vowed to be both a developer AND a hacker, and to spread the gospel of application security to other programmers. But when she took a job with the Canadian government, nothing could prepare her for the looming th…
…
continue reading
1
Episode 226: On Digital Fingerprints and Dirty Money
44:01
44:01
Play later
Play later
Lists
Like
Liked
44:01Jeff Williams on the business of moving money: who gets blocked, what slips through, and why checking the right boxes doesn’t always mean a win in the nascent AI-powered sanctions compliance space. From fentanyl money to shell companies, we follow the (often filthy dirty) money. Learn more about your ad choices. Visit megaphone.fm/adchoices…
…
continue reading
1
Bill Cameron on partner nation cybersecurity, and cyberspace escalation
1:33:25
1:33:25
Play later
Play later
Lists
Like
Liked
1:33:25Retired Navy officer and cybersecurity leader Bill Cameron joins Andy Sauer to discuss the evolving landscape of cyber conflict. From flying helicopters in the Cold War to advising U.S. presidents, Bill shares lessons in leadership, resilience, and mission focus. He explains why partner nations’ vulnerable networks matter to U.S. security, how adve…
…
continue reading
1
How Microsoft Is Redefining Global Cyber Defense
35:30
35:30
Play later
Play later
Lists
Like
Liked
35:30Amy Hogan-Burney, Corporate Vice President of Customer Trust and Security at Microsoft joins Ann on this week's episode of Afternoon Cyber Tea to discuss her unexpected journey into cybersecurity, Microsoft’s evolving approach to combating global cybercrime, and the importance of collaboration across the private and public sectors. She reflects on …
…
continue reading
1
Episode 225: Big Breaches and Click Bots to AI and Beyond
38:04
38:04
Play later
Play later
Lists
Like
Liked
38:04When a young engineer uncovered a sizeable click fraud situation at Google, he discovered a bigger problem; namely, the perverse ingenuity that drives online fraud and scams. "Big Breaches" author Neil Daswani joined us to talk click farms, data breaches, AI exploits, and the big picture of cybercrime today. Learn more about your ad choices. Visit …
…
continue reading
1
Episode 224: Jackals of Trust: A Short History of Cybercrime
47:31
47:31
Play later
Play later
Lists
Like
Liked
47:31Cybercrime expert Gary Warner joins to discuss Nigerian confraternities, the "campus cults" rooted in idealism that morphed into a multi-billion dollar transnational organized crime network. Learn about the "money blessing," the coded language and insider access, and the elite thug playbook for exploiting trust. Learn more about your ad choices. Vi…
…
continue reading
Tanya Janca is a globally recognized AppSec (application security) expert and founder of We Hack Purple. In this episode, she shares wild stories from the front lines of cybersecurity. She shares stories of when she was a penetration tester to an incident responder. You can sign up for her newsletter at https://newsletter.shehackspurple.ca/ Sponsor…
…
continue reading
1
The Power of Converged Security in a Connected World
46:19
46:19
Play later
Play later
Lists
Like
Liked
46:19Darren Kane, Chief Security Officer at NBN, Australia’s national broadband network joins Ann on this week's episode of Afternoon Cyber Tea to shares insights from his unique journey through law enforcement, financial enforcement, and corporate security, and how those experiences shaped his leadership of a converged security organization that unites…
…
continue reading
1
Episode 223: How to Make Your House Invisible
41:11
41:11
Play later
Play later
Lists
Like
Liked
41:11When scammers tried to steal Graceland, it seemed like a fluke, but deed fraud is very much on the rise. Del Denney of the Land Trust Company explains how criminals steal homes and how to stop it from happening to you. Plus, we revisit Adam Levin's wallet ripper about a twice-targeted beachfront property. Learn more about your ad choices. Visit meg…
…
continue reading
1
Jennifer Ewbank on the CIA, Innovation in AI, and the Race with China
1:08:35
1:08:35
Play later
Play later
Lists
Like
Liked
1:08:35Jennifer Ewbank, former Deputy Director of the CIA for Digital Innovation, joins The Watchers to discuss the intersection of espionage and emerging technology. From her decades in the field to leading the Agency’s digital transformation, she shares insights on the race with China in AI, the challenges of intelligence in a sensor-rich world, and the…
…
continue reading
1
Episode 222: Heather Barnhart Hunts Digital Ghosts
50:18
50:18
Play later
Play later
Lists
Like
Liked
50:18Forensic expert Heather Barnhart (SANS Institute) decoded Osama Bin Laden's phones and helped convict quadruple murderer Brian Kohberger. Learn how surviving her own harassment fueled her mission, plus the digital "pattern of life" hack and simple steps to combat AI deepfakes and stay safe online. Learn more about your ad choices. Visit megaphone.f…
…
continue reading
1
From Silos to Solutions: Building Trust Through Transparent Cybersecurity Communications with Microsoft's Frank Shaw
28:50
28:50
Play later
Play later
Lists
Like
Liked
28:50Frank X. Shaw, Chief Communications Officer at Microsoft, joins Ann on this week's episode of Afternoon Cyber Tea to explore the critical role of communication in cybersecurity. They discuss how transparency and trust shape effective response to cyber incidents, the importance of breaking down silos across teams, and how AI is transforming communic…
…
continue reading
1
Episode 221: Seth Godin's Anti-Spam Playbook: Be Awesome
44:29
44:29
Play later
Play later
Lists
Like
Liked
44:29Marketing visionary Seth Godin explains how the Internet got hijacked by an attention-stealing spam economy that keeps us in an endless loop of badly targeted marketing. Godin's anti-spam playbook: demand companies earn your attention with awesomeness, and break the digital slop loop that broke the Internet. Learn more about your ad choices. Visit …
…
continue reading
1
Jack Rhysider on Darknet Diaries, Privacy, and the Future of Cybersecurity
1:20:43
1:20:43
Play later
Play later
Lists
Like
Liked
1:20:43Jack Rhysider, creator of Darknet Diaries, joins The Watchers to talk privacy, hacking culture, and the evolving threats shaping our digital lives. From disguises at DEFCON to exploring hacker origins in video games, Jack shares insights on why breaches are inevitable, how underground communities evolve, and where optimism fits in the face of AI, n…
…
continue reading
1
"I was addicted to making money." Confessions of a Chronic Card Skimmer 💳 Ep. 164: Oak Cliff Swipers
1:28:04
1:28:04
Play later
Play later
Lists
Like
Liked
1:28:04By Jack Rhysider
…
continue reading
By Jack Rhysider
…
continue reading
1
Episode 220: The $5,000 Mistake: Inside a Facebook Scam
45:18
45:18
Play later
Play later
Lists
Like
Liked
45:18By DeleteMe
…
continue reading
1
Tatyana Bolton on Cyber Policy, OT Security, and the Speed of Relevance
1:42:02
1:42:02
Play later
Play later
Lists
Like
Liked
1:42:02In this episode of The Watchers, Andy Sauer sits down with cybersecurity leader Tatyana Bolton. From her unexpected start in acting to shaping national policy at CISA, Google, and beyond, Tatyana shares her perspective on why U.S. cyber defenses must keep pace with adversaries moving at the “speed of relevance.” They discuss policy gridlock, supply…
…
continue reading
1
Lessons from the Frontlines of Industrial Security
37:55
37:55
Play later
Play later
Lists
Like
Liked
37:55Volker Wagner, Chief Information Security Officer at BASF, joins Ann on this week's episode of Afternoon Cyber Tea to talk shop on what it really takes to defend one of the world’s largest chemical companies. From his early days in auditing to leading global cyber for high-stakes industrial and research environments, Volker shares battle-tested ins…
…
continue reading
1
Episode 219: 3 Ways Not to Lose Everything
43:46
43:46
Play later
Play later
Lists
Like
Liked
43:46Former federal prosecutor Tom O’Malley takes us inside the strange, high-stakes world of modern fraud—where victims are presumed guilty, families lose fortunes, and the fight against global crime rings starts at home. Three lessons that could make a difference. Voting: https://vote.signalaward.com/PublicVoting?utm_campaign=signal4_finalists_finalis…
…
continue reading
1
Episode 218: The Data Grift Everyone Missed
50:25
50:25
Play later
Play later
Lists
Like
Liked
50:25Every click, swipe, and post fuels the data economy. Credit cards, apps, even maps—our lives are scraped, stitched, and sold. It feels like a heist, and sometimes it is. Identity Theft Resource Center CEO Eva Casey-Velasquez insists the picture isn’t entirely bleak. This week we talk about the good, the bad, and the ugly of data brokers. Learn more…
…
continue reading
Matt Rowe, Chief Security Officer at Lloyds Bank, joins Ann on this week's episode of Afternoon Cyber Tea to explore the future of cybersecurity. They discuss the accelerating pace of change in the industry, from AI and automation to data-driven security practices and identity management. Matt shares how Lloyds Bank is modernizing its approach by r…
…
continue reading
It started with a slow roll of weird emails and phone calls. And then award-winning filmmaker Dan Sturman found himself in the crosshairs of serious hackers. With parallels to another case of mistaken identity and an assist from security expert Reuben Moretz, this week we explore bad social engineering. Learn more about your ad choices. Visit megap…
…
continue reading
1
Gentry Lane on cyber weapons, national defense, and the race for global cyber power
1:37:22
1:37:22
Play later
Play later
Lists
Like
Liked
1:37:22Cybersecurity strategist Gentry Lane joins The Watchers to unpack why cyber weapons should be treated as real weapons of war. She and Andy Sauer dive into the absence of a national cyber strategy, the vulnerabilities of America’s critical infrastructure, and the role of Europe in the global cyber power race. From the dangers of supply chain weaknes…
…
continue reading
1
Episode 216: Who’s Watching the Watchers?
47:14
47:14
Play later
Play later
Lists
Like
Liked
47:14Feeling watched? Join us as Vermont Attorney General Charity Clark breaks down the new reality of digital surveillance. From school apps to AI scams, we dive into how companies collect your data and how to take control of your online privacy. The war for privacy is real—and it's a fight you can't afford to lose. Learn more about your ad choices. Vi…
…
continue reading
1
From Bottlenecks to Breakthroughs: Aligning Legal and Security Teams
39:06
39:06
Play later
Play later
Lists
Like
Liked
39:06Erez Liebermann, partner at Debevoise & Plimpton and a leading voice in cybersecurity and data privacy joins Ann on this week's episode of Afternoon Cyber Tea. Together, they unpack how legal and security teams can act as strategic partners, aligning regulatory compliance with business priorities while preparing for and responding to incidents. Ere…
…
continue reading
1
He Was Arrested as a Russian Hacker, But The Truth Is Far Scarier ☠ Darknet Diaries Ep. 163: Ola
1:22:58
1:22:58
Play later
Play later
Lists
Like
Liked
1:22:58In 2019, Ola Bini, a Swedish programmer and privacy advocate, was arrested in Ecuador with no evidence and no motive. But what's really going on goes far deeper than he could imagine. Visit https://darknetdiaries.com/episode/163/ for a list of sources, full transcripts, and to listen to all episodes. ... https://www.youtube.com/watch?v=4xnX9tQtk2A…
…
continue reading
In 2019, Ola Bini, a Swedish programmer and privacy advocate, was arrested in Ecuador for being a Russian hacker. Find Ola on X: https://x.com/olabini. Or visit his website https://olabini.se/blog/. Or check out his non-profit https://autonomia.digital/. Sponsors Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint…
…
continue reading
1
Episode 215: They Targeted His Mom, He Went Full CIA
43:41
43:41
Play later
Play later
Lists
Like
Liked
43:41A fake Microsoft pop-up cost Ken Westbrook’s mom her life savings. But they scammed the wrong family. Westbrook is former CIA. These days he’s sounding the alarm on how foreign crime rings steal billions from Americans with smishing campaigns, scareware, and gift cards. We talked about solutions. Learn more about your ad choices. Visit megaphone.fm…
…
continue reading
1
Episode 214: DEF CON Redux with Rachel Tobac!
38:14
38:14
Play later
Play later
Lists
Like
Liked
38:14In this second installment of our DEF CON two-parter, we talked to SocialProof Security CEO Rachel Tobac about how and why people are often the weakest link in so many cybersecurity protocols and how making yourself a harder target will cause most threat actors to move on to an easier mark. Learn more about your ad choices. Visit megaphone.fm/adcho…
…
continue reading
1
The Psychology of Speaking Up with Amy Edmondson
32:17
32:17
Play later
Play later
Lists
Like
Liked
32:17Amy Edmondson, Harvard Business School professor and psychological safety pioneer joins Ann on this week's episode of Afternoon Cyber Tea. Together they discuss how creating psychologically safe environments allows teams, especially in high-pressure fields like cybersecurity, to speak up about early warnings, embrace the red, and learn from failure…
…
continue reading
1
Episode 213: Inside DEF CON’s Social Engineering Village
41:34
41:34
Play later
Play later
Lists
Like
Liked
41:34At DEF CON’s Social Engineering Village, contestants have 22 minutes to charm real employees at real companies into revealing real details that could lead to a breach. We step inside the booth to see how persuasion, improv, and psychology fuel both ethical hacking and the rise of cybercrime worldwide. Learn more about your ad choices. Visit megapho…
…
continue reading
1
Episode 212: How to Talk to a Cybercriminal
42:39
42:39
Play later
Play later
Lists
Like
Liked
42:39Kurtis Minder knows the dark web better than most—and he’s not just watching from the sidelines. As a ransomware negotiator, he’s helped victims talk their way out of seemingly impossible situations. This week, we explore how cybercriminals operate, what makes them tick, and what you need to know to avoid becoming their next target. Learn more abou…
…
continue reading
1
Nasrin Rezai on the Frontlines of Cybersecurity
29:00
29:00
Play later
Play later
Lists
Like
Liked
29:00Nasrin Rezai, SVP and CISO at Verizon joins Ann on this week's episode of Afternoon Cyber Tea. Nasrin shares practical defense strategies for hard-to-secure legacy systems, emphasizes the importance of zero trust, and explains why cybersecurity is now a matter of national defense. Despite the challenges, she closes with optimism, believing that inn…
…
continue reading
1
These 8 Companies You've Never Heard Of Sell Your Personal Data to the Cops 🚨 Ep. 162: Hieu
1:33:57
1:33:57
Play later
Play later
Lists
Like
Liked
1:33:57Before he even graduated high school, Hieu Minh Ngo had stolen 100,000 credit cards. But that was just the beginning of his hacking career. When he stumbled into the terrifying (and perfectly legal) world of data brokers, he built a pipeline for identity theft on a massive scale. But why are these companies even allowed to exist? And who are they s…
…
continue reading
All Hieu Minh Ngo wanted was to make money online. But when he stumbled into the dark web, he found more than just opportunity, he found a global dark market. What started as a side hustle turned into an international crime spree. Find Hieu on X: https://x.com/HHieupc. Sponsors Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero…
…
continue reading