$alt1
▶ play ♪ mp3 m3u

90: Jenny

MeetJenny Radcliffe, the People Hacker. She’s a social engineer and physical penetration tester. Which means she gets paid to break into buildings and test their security. In this episode she tells us

$alt2
▶ play ♪ mp3 m3u

89: Cybereason - Molerats in the Cloud

The threat research team at Cybereason uncovered an interesting piece of malware. Studied it and tracked it. Which lead them to believe they were dealing with a threat actor known as

$alt3
▶ play ♪ mp3 m3u

88: Victor

Victorlooks for on the web and reports them responsibly. This is the story about discloser number 5780.Listen to episodes86, and87before this one to be caught up on the story leading u

$alt4
▶ play ♪ mp3 m3u

87: Guild of the Grumpy Old Hackers

n 2016 the LinkedIn breach data became available to the public. What the Guild of the Grumpy Old Hackers did with it then is quite the story. Listen andMattijstell their story.Sponsors



$alt5
▶ play ♪ mp3 m3u

86: The LinkedIn Incident

In 2012, LinkedIn was the target of a data breach. A hacker got in and stole millions of user details. Username and password hashes were then sold to people willing to buy. This episode goes over the

$alt6
▶ play ♪ mp3 m3u

85: Cam the Carder

This is the story ofCam Harrison, aka “kilobit” and his rise and fall as a prominent for this show comes from IT Pro TV. Get 65 hours of free training by

$alt7
▶ play ♪ mp3 m3u

84: Jet-setters

How bad is it if you post your boarding pass on Instagram? Our to figure this out for themself and has quite a story about what happened. You can read more from “Alex” on their blo

$alt8
▶ play ♪ mp3 m3u

83: NSA Cryptologists

In this episode we interview two NSA J. CareyandJeff Man. We hear their story of how they got into the NSA and what they did while there.To hear more stories from Jeff tune intoPa


$alt9
▶ play ♪ mp3 m3u

82: Master of Pwn

TheZero Day Initiativeruns a hacker contest calledPwn2Own. The contest calls the best hackers in the world to demonstrate they can hack into software that should be secure. Like browsers, phones, and

$alt10
▶ play ♪ mp3 m3u

81: The Vendor

This is the story of a darknet marketplace vendor we’ll name V. V tells his story of how he first became a buyer, then transitioned into seller.This episode talks about drugs. Listener discretion is a

$alt11
▶ play ♪ mp3 m3u

80: The Whistleblower

In this episode we hear a story from a social engineer who’s job it is to get people to do things they don’t want to do. Why? For for this episode comes can

$alt12
▶ play ♪ mp3 m3u

79: Dark Basin

What do you do when you find yourself the target of a massive hacking campaign, and you are getting thousands of phishing emails and someone following you in your car. You might turn to Citizen Lab wh


$alt13
▶ play ♪ mp3 m3u

78: Nerdcore

Nerdcore music is music for nerds. In this episode we hear from some of the musicians who make Nerdcore music.This episode features andDual Core.Content warning: This episode ha

$alt14
▶ play ♪ mp3 m3u

77: Olympic Destroyer

In February 2018, during the Winter Olympics in Pyeongchang South Korea, a cyber attack struck, wiping out a lot of the Olympic’s digital Teams rushed to get things back up, but it was

$alt15
▶ play ♪ mp3 m3u

76: Knaves Out

This is the story about how someone hacked into JP Morgan Chase, one of the biggest financial institutions in the world. It’s obvious why someone would want to break into a bank right? Well the people

$alt16
▶ play ♪ mp3 m3u

75: Compromised Comms

From 2009 to 2013 the communication channels the CIA uses to contact assets in foreign countries was compromised. This had terrifying this episodes areJenna Dorfm



darknet

subscribe m3u
Podcasts about darknet.
Sub created by yama, moderated by yama. Suggest a podcast (pending approvals: 1)
 

links



Creating your own community (subpoddl) is free and easy. Once signed up you can create your own community
Tip: click on thumbnail image for direct mp3 download