91 episodes

Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.

Darknet Diaries Jack Rhysider

    • Technology
    • 4.8 • 161 Ratings

Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.

    webjedi

    webjedi

    What happens when an unauthorized intruder gets into the network of a major bank? Amélie Koran aka webjedi was there for one of these intrusions and tells us the story of what happened.
    You can find more talks from Amélie at her website webjedi.net.
    Sponsors
    Support for this show comes from IT Pro TV. Get 65 hours of free training by visiting ITPro.tv/darknet. And use promo code DARKNET25.
    This podcast is sponsored by Navisite. Accelerate IT transformation to respond to new demands, lower costs and prepare for whatever comes next. Visit Navisite.com/go.
    View all active sponsors.
    Sources

    https://www.foxnews.com/story/0,2933,435681,00.html

    https://w2.darkreading.com/risk-management/world-bank-(allegedly)-hacked/d/d-id/1072857

    https://www.washingtonpost.com/nation/2020/05/18/missionary-pilot-death-coronavirus/

    https://webjedi.net/

    • 58 min
    Jenny

    Jenny

    Meet Jenny Radcliffe, the People Hacker. She’s a social engineer and physical penetration tester. Which means she gets paid to break into buildings and test their security. In this episode she tells us a few stories of some penetration testing jobs she’s done.
    Sponsors
    Support for this show comes from Blinkist. They offer thousands of condensed non-fiction books, so you can get through books in about 15 minutes. Check out Blinkist.com/DARKNET to start your 7 day free trial and get 25% off when you sign up.
    This podcast is sponsored by Navisite. Accelerate IT transformation to respond to new demands, lower costs and prepare for whatever comes next. Visit Navisite.com/go.
    View all active sponsors.
    Sources
    humanfactorsecurity.co.uk

    • 1 hr 11 min
    Cybereason - Molerats in the Cloud

    Cybereason - Molerats in the Cloud

    The threat research team at Cybereason uncovered an interesting piece of malware. Studied it and tracked it. Which lead them to believe they were dealing with a threat actor known as Molerats. 
    Sponsors
    This episode is sponsored by Cybereason. Cybereason reverses the attacker’s advantage and puts the power back in your hands. Their future-ready attack platform gives defenders the wisdom to uncover, understand, and piece together multiple threats. And the precision focus to end cyberattacks instantly – on computers, mobile devices, servers, and the cloud. They do all this through a variety of tools they’ve developed such as antivirus software, endpoint monitoring, and mobile threat detection tools. They can give you the power to do it yourself, or they can do all the monitoring and respond to threats in your environment for you. Or you can call them after an incident to get help cleaning up. If you want to monitor your network for threats, check out what Cybereason can do for you. Cybereason. End cyber attacks. From endpoints to everywhere. Learn more at Cybereason.com/darknet.
    View all active sponsors.
    Sources

    https://www.cybereason.com/hubfs/dam/collateral/reports/Molerats-in-the-Cloud-New-Malware-Arsenal-Abuses-Cloud-Platforms-in-Middle-East-Espionage-Campaign.pdf

    https://malpedia.caad.fkie.fraunhofer.de/actor/molerats

    https://www.fireeye.com/blog/threat-research/2013/08/operation-molerats-middle-east-cyber-attacks-using-poison-ivy.html

    • 59 min
    Victor

    Victor

    Victor looks for vulnerabilities on the web and reports them responsibly. This is the story about discloser number 5780.
    Listen to episodes 86, and 87 before this one to be caught up on the story leading up to this.
    Sponsors
    This podcast is sponsored by Navisite. Accelerate IT transformation to respond to new demands, lower costs and prepare for whatever comes next. Visit Navisite.com/go.
    This podcast is sponsored by the JSCM Group. They have a service called ClosedPort: Scan, and it’s is a monthly Penetration Test performed by Cyber Security Experts. Contact JSCM Group today at jscmgroup.com/darknet.
    Support for this show comes from IT Pro TV. Get 65 hours of free training by visiting ITPro.tv/darknet. And use promo code DARKNET25.

    • 45 min
    Guild of the Grumpy Old Hackers

    Guild of the Grumpy Old Hackers

    In 2016 the LinkedIn breach data became available to the public. What the Guild of the Grumpy Old Hackers did with it then is quite the story. Listen to Victor, Edwin, and Mattijs tell their story.
    Sponsors
    Support for this show comes from Blinkist. They offer thousands of condensed non-fiction books, so you can get through books in about 15 minutes. Check out Blinkist.com/DARKNET to start your 7 day free trial and get 25% off when you sign up.
    Support for this show comes from Privacy.com. Privacy allows you to create anonymous debit cards instantly to use for online shopping. Visit privacy.com/darknet to get a special offer.
    View all active sponsors.

    • 49 min
    LinkedIn

    LinkedIn

    In 2012, LinkedIn was the target of a data breach. A hacker got in and stole millions of user details. Username and password hashes were then sold to people willing to buy. This episode goes over the story of what happened.
    For a good password manager, check out LastPass.
    Sponsors
    Support for this episode comes from Quadrant Information Security. If you need a team of around the clock analysts to monitor for threat in your network using a custom SIEM, check out what Quadrant can do for you by visiting www.quadrantsec.com.
    Support for this show comes from Thinkst Canary. Their canaries attract malicious actors in your network and then send you an alert if someone tries to access them. Great early warning system for knowing when someone is snooping around where they shouldn’t be. Check them out at https://canary.tools.
    Support for this show comes from Linode. Linode supplies you with virtual servers. Visit linode.com/darknet and get a special offer.

    • 54 min

Customer Reviews

4.8 out of 5
161 Ratings

161 Ratings

iManuelB ,

Amazing

This show kinda ruined other shows due to the high expectations I got now for other shows.

It is just truly fun and educating to listen to. And the way of storytelling makes you wanna bingelisten all previous versions in 1 go.

MaaktHetUitWie ,

Sucks you right in

One of the best podcasts. Its not what or how you think or expect, but damn its good

Allards ,

Eye opener

I have been security savvy, but this show not only entertains, but also educates me further; on why and how to improve security in my business and private domains.

Top Podcasts In Technology

Listeners Also Subscribed To