129 episódios

Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.

Darknet Diaries Darknet Diaries+

    • Tecnologia
    • 4,9 • 29 classificações

Ouvir em Apple Podcasts
Requer uma assinatura e o macOS 11.4 ou superior

Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.

Ouvir em Apple Podcasts
Requer uma assinatura e o macOS 11.4 ou superior

    Hot Wallets

    Hot Wallets

    In this episode we interview journalist Geoff White to discuss some of the recent crypto currency heists that have been happening. Geoff has been tracking a certain group of thieves for some time and shares his knowledge of what he’s found.

    Much of what we talk about in this episode has been published in Geoff’s new book The Lazarus Heist: From Hollywood to High Finance: Inside North Korea’s Global Cyber War (https://amzn.to/3mKf1qB).

    Sponsors
    Support for this show comes from Axonius. Securing assets — whether managed, unmanaged, ephemeral, or in the cloud — is a tricky task. The Axonius Cybersecurity Asset Management Platform correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. axonius.com/darknet

    Support for this show comes from Thinkst Canary. Their canaries attract malicious actors in your network and then send you an alert if someone tries to access them. Great early warning system for knowing when someone is snooping around where they shouldn’t be. Check them out at https://canary.tools.

    • 59 min
    Hot Swaps

    Hot Swaps

    This is the story of Joseph Harris (https://twitter.com/akad0c). When he was a young teen he got involved with stealing video game accounts and selling them for money. This set him on a course where he flew higher and higher until he got burned.

    Joseph sometimes demonstrates vulnerabilities he finds on his YouTube channel https://www.youtube.com/channel/UCdcuF5Zx6BiYmwnS-CiRAng.

    Listen to episode 112 “Dirty Coms” to hear more about what goes on in the communities Joseph was involed with.

    Sponsors
    Support for this show comes from Axonius. Securing assets — whether managed, unmanaged, ephemeral, or in the cloud — is a tricky task. The Axonius Cybersecurity Asset Management Platform correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks.

    Support for this show comes from Synack. Synack is a penetration testing firm. But they also have a community of, people like you, who earn regular money by legally hacking. If you’re interested in getting paid to hack, visit them now at synack.com/red-team, and click ‘apply now.’

    • 1h 28 min
    Daniel the Paladin

    Daniel the Paladin

    Daniel Kelley (https://twitter.com/danielmakelley) was equal parts mischievousness and clever when it came to computers. Until the day his mischief overtook his cleverness.

    Sponsors
    Support for this show comes from Keeper Security. Keeper Security’s is an enterprise password management system. Keeper locks down logins, payment cards, confidential documents, API keys, and database passwords in a patented Zero-Knowledge encrypted vault. And, it takes less than an hour to deploy across your organization. Get started by visiting keepersecurity.com/darknet.

    Support for this podcast comes from Cybereason. Cybereason reverses the attacker’s advantage and puts the power back in the defender’s hands. End cyber attacks. From endpoints to everywhere. Learn more at Cybereason.com/darknet.

    • 1h 11 min
    Mad Dog

    Mad Dog

    Jim Lawler, aka “Mad Dog”, was a CIA case officer for 25 years. In this episode we hear some of the stories he has and things he did while working in the CIA.

    Jim has two books out. Affiliate links below.
    Living Lies: A Novel of the Iranian Nuclear Weapons Program https://amzn.to/3s0Ppca
    In the Twinkling of an Eye: A Novel of Biological Terror and Espionage https://amzn.to/3y7B4OL

    Sponsors
    Support for this show comes from Linode. Linode supplies you with virtual servers. Visit linode.com/darknet and get a special offer.

    Support for this show comes from Juniper Networks. Juniper Networks is dedicated to simplifying network operations and driving superior experiences for end users. Visit juniper.net/darknet to learn more about how Juniper’s Zero Trust Data Center provides uncompromising visibility across all your data center environments. Visit juniper.net/darknet to learn more.

    • 1h 15 min
    Player Cheater Developer Spy

    Player Cheater Developer Spy

    Some video game players buy cheats to win. Let’s take a look at this game cheating industry to see who the players are.

    Sponsors
    Support for this show comes from Axonius. Securing assets — whether managed, unmanaged, ephemeral, or in the cloud — is a tricky task. The Axonius Cybersecurity Asset Management Platform correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free.

    Support for this podcast comes from Cybereason. Cybereason reverses the attacker’s advantage and puts the power back in the defender’s hands. End cyber attacks. From endpoints to everywhere. Learn more at Cybereason.com/darknet.

    • 41 min
    Bonus 10: Philippe

    Bonus 10: Philippe

    I’m excited to bring you this story - what happens when an employee notices a vulnerability, reports it, and waits in silence.
    Thank you for the support. It means so much to me. It's challenging to run the show, and you keep me going!

    The Final Bonus Episode

    While this is the last bonus episode I plan to publish (more details in the audio), you will still get ad free versions of the show as a Patreon supporter or Premium Apple Podcasts subscriber.

    Show notes

    Find Philippe Delteil on Twitter at https://twitter.com/PhilippeDelteil.

    Skytalks issued a statement about this story: https://skytalks.info/so-a-couple-years-ago-this-thing-happened/

    https://www.ciperchile.cl/2016/03/05/grave-falla-en-la-red-del-minsal-dejo-expuesta-informacion-confidencial-de-pacientes/

    https://www-trendtic-cl.translate.goog/2018/12/las-10-noticias-mas-leidas-el-2018-en-trendtic-cl/?_x_tr_sl=auto&_x_tr_tl=en&_x_tr_hl=en-US&_x_tr_pto=wapp

Críticas de clientes

4,9 de 5
29 classificações

29 classificações

inesmartns ,

Probably my favorite podcast

Just shut up and take my money.
I love it.
Some of these stories need to be adapted into movies.

fernandes1198 ,

Just Amazing

Awesome host, great communication, everything you need to have a great time learning from other and enjoying great stories

krust ,

Love it

A great insight into the dark side of the internet. Highly recommended.

Top de podcasts em Tecnologia

Lex Fridman
Jason Calacanis
Wes Bos & Scott Tolinski - Full Stack JavaScript Web Developers
Matt Stauffer
Rui Tukayana, TSF
BNR Nieuwsradio

Talvez também goste

Cybereason
VICE
CyberWire Inc.
CyberWire, Inc.
Graham Cluley, Carole Theriault
Sticks & Stones