127 episodes

Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.

Darknet Diaries Darknet Diaries+

    • Technology
    • 5.0 • 39 Ratings

Listen on Apple Podcasts
Requires subscription and macOS 11.4 or higher

Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.

Listen on Apple Podcasts
Requires subscription and macOS 11.4 or higher

    Daniel the Paladin

    Daniel the Paladin

    Daniel Kelley (https://twitter.com/danielmakelley) was equal parts mischievousness and clever when it came to computers. Until the day his mischief overtook his cleverness.

    Sponsors
    Support for this show comes from Keeper Security. Keeper Security’s is an enterprise password management system. Keeper locks down logins, payment cards, confidential documents, API keys, and database passwords in a patented Zero-Knowledge encrypted vault. And, it takes less than an hour to deploy across your organization. Get started by visiting keepersecurity.com/darknet.

    Support for this podcast comes from Cybereason. Cybereason reverses the attacker’s advantage and puts the power back in the defender’s hands. End cyber attacks. From endpoints to everywhere. Learn more at Cybereason.com/darknet.

    • 1 hr 11 min
    Mad Dog

    Mad Dog

    Jim Lawler, aka “Mad Dog”, was a CIA case officer for 25 years. In this episode we hear some of the stories he has and things he did while working in the CIA.

    Jim has two books out. Affiliate links below.
    Living Lies: A Novel of the Iranian Nuclear Weapons Program https://amzn.to/3s0Ppca
    In the Twinkling of an Eye: A Novel of Biological Terror and Espionage https://amzn.to/3y7B4OL

    Sponsors
    Support for this show comes from Linode. Linode supplies you with virtual servers. Visit linode.com/darknet and get a special offer.

    Support for this show comes from Juniper Networks. Juniper Networks is dedicated to simplifying network operations and driving superior experiences for end users. Visit juniper.net/darknet to learn more about how Juniper’s Zero Trust Data Center provides uncompromising visibility across all your data center environments. Visit juniper.net/darknet to learn more.

    • 1 hr 15 min
    Player Cheater Developer Spy

    Player Cheater Developer Spy

    Some video game players buy cheats to win. Let’s take a look at this game cheating industry to see who the players are.

    Sponsors
    Support for this show comes from Axonius. Securing assets — whether managed, unmanaged, ephemeral, or in the cloud — is a tricky task. The Axonius Cybersecurity Asset Management Platform correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free.

    Support for this podcast comes from Cybereason. Cybereason reverses the attacker’s advantage and puts the power back in the defender’s hands. End cyber attacks. From endpoints to everywhere. Learn more at Cybereason.com/darknet.

    • 40 min
    Bonus 10: Philippe

    Bonus 10: Philippe

    I’m excited to bring you this story - what happens when an employee notices a vulnerability, reports it, and waits in silence.
    Thank you for the support. It means so much to me. It's challenging to run the show, and you keep me going!

    The Final Bonus Episode

    While this is the last bonus episode I plan to publish (more details in the audio), you will still get ad free versions of the show as a Patreon supporter or Premium Apple Podcasts subscriber.

    Show notes

    Find Philippe Delteil on Twitter at https://twitter.com/PhilippeDelteil.

    Skytalks issued a statement about this story: https://skytalks.info/so-a-couple-years-ago-this-thing-happened/

    https://www.ciperchile.cl/2016/03/05/grave-falla-en-la-red-del-minsal-dejo-expuesta-informacion-confidencial-de-pacientes/

    https://www-trendtic-cl.translate.goog/2018/12/las-10-noticias-mas-leidas-el-2018-en-trendtic-cl/?_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=en-US&_x_tr_pto=wapp

    HD

    HD

    HD Moore (https://twitter.com/hdmoore) invented a hacking tool called Metasploit. He crammed it with tons of exploits and payloads that can be used to hack into computers. What could possibly go wrong? Learn more about what HD does today by visiting rumble.run/.

    Sponsors
    Support for this show comes from Quorum Cyber. They exist to defend organisations against cyber security breaches and attacks. That’s it. No noise. No hard sell. If you’re looking for a partner to help you reduce risk and defend against the threats that are targeting your business — and specially if you are interested in Microsoft Security - reach out to www.quorumcyber.com.

    Support for this show comes from Snyk. Snyk is a developer security platform that helps you secure your applications from the start. It automatically scans your code, dependencies, containers, and cloud infrastructure configs — finding and fixing vulnerabilities in real time. And Snyk does it all right from the existing tools and workflows you already use. IDEs, CLI, repos, pipelines, Docker Hub, and more — so your work isn’t interrupted. Create your free account at snyk.co/darknet.

    • 1 hr 17 min
    Adam

    Adam

    Adam got a job doing IT work at a learning academy. He liked it and was happy there and feeling part of the team. But a strange series of events took him in another direction, that definitely didn’t make him happy.

    Sponsors
    Support for this show comes from Axonius. Securing assets — whether managed, unmanaged, ephemeral, or in the cloud — is a tricky task. The Axonius Cybersecurity Asset Management Platform correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free.

    Support for this podcast comes from Cybereason. Cybereason reverses the attacker’s advantage and puts the power back in the defender’s hands. End cyber attacks. From endpoints to everywhere. Learn more at Cybereason.com/darknet.

    Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet.

    • 54 min

Customer Reviews

5.0 out of 5
39 Ratings

39 Ratings

mrtnzlml ,

Incredible

I've never enjoyed any other podcast that much!

Gift 505 ,

Awesome

I didn’t met an awesomer podcast than this one.

G.o.m.o.r.a3012 ,

From podcast hater to podcast lover

Really cool stories from the tech world, really entertaning!

Top Podcasts In Technology

Michal Půr
Ekonomické stavby
Josef Tetek
Lex Fridman
PCTuning.cz
FIT ČVUT v Praze

You Might Also Like

Cybereason
VICE
CyberWire Inc.
CyberWire, Inc.
Graham Cluley, Carole Theriault
Dog And Pony Show Audio