Darknet Diaries

Darknet Diaries

Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.

Darknet Diaries Podcast Episodes (Page 9)

73: WannaCry
It is recommend to listen to episodes 53 “Shadow Brokers”, 71 “FDFF”, and 72 “Bangladesh Bank Heist” before listening to this one.In May 2017 the world fell victim to a major ransomware attack known as WannaCry. One of the victims was UK’s national health service. Security researchers scrambled to try to figure out how to stop it and who was behind..
4 years, 2 months ago
0 Comments
72: Bangladesh Bank Heist
A bank robbery with the objective to steal 1 billion dollars. This is the story of the largest bank robbery in history. And it was all done over a computer.Our guest this episode was Geoff White. Learn more about him at geoffwhite.tech.Check out Geoff’s new book Crime Dot Com. Affiliate link: https://www.amazon.com/gp/product/1789142857/ref=as_li_t..
4 years, 3 months ago
0 Comments
71: Information Monopoly
In this episode, we’re going into the depths of North Korea to conduct one of the greatest hacks of all time. To find a way to inject information into a country run by totalitarian regime.A big thanks to Yeonmi Park for sharing her story with us. Also thanks to Alex Gladstein for telling us the inside story.You can find more about Flash Drive For F..
4 years, 3 months ago
0 Comments
70: Ghost Exodus
Ghost Exodus is a hacker. He conducted various illegal activities online. Some of which he documents on YouTube. He’s also a great musician. He got into some trouble from his hacking. This is his story.A big thanks to Ghost Exodus for sharing his story with us. Also thanks to Wesley McGrew for telling us the inside story.SponsorsThis episode was sp..
4 years, 4 months ago
0 Comments
69: Human Hacker
We all know that computers and networks are vulnerable to hacking and malicious actors, but what about us, the humans who interface with these devices? Con games, scams, and strategic deception are far older than computers, and in the modern era, these techniques can make humans the weakest link in even the most secure system. This episode, securit..
4 years, 4 months ago
0 Comments
68: Triton
A mysterious mechanical failure one fateful night in a Saudi Arabian chemical plant leads a cast of operational technology researchers down a strange path towards an uncommon, but grave, threat. In this episode, we hear how these researchers discovered this threat and tried to identify who was responsible for the malware behind it. We also consider..
4 years, 5 months ago
0 Comments
67: The Big House
John Strand is a penetration tester. He’s paid to break into computer networks and buildings to test their security. In this episode we listen to stories he has from doing this type of work.Thanks to John Strand for coming on the show and telling your story.SponsorsSupport for this episode comes from LastPass. LastPass is a great password manager b..
4 years, 5 months ago
0 Comments
66: freakyclown
Freakyclown is a physical penetration tester. His job is to break into buildings to test the security of the building. In this episode we hear stories of some of these missions he’s been on.Thanks to Freakyclown for coming on the show and telling your story.SponsorsThis episode was sponsored by IT Pro TV. Get 65 hours of free training by visiting I..
4 years, 5 months ago
0 Comments
65: PSYOP
PSYOP, or “Psychological Operations”, is something the US military has been doing to foreign audiences for decades. But what exactly is it? And what’s the difference between white, gray, and black PSYOP missions? We talk to PSYOP specialists to learn more.Thanks to Jon Nichols for telling us about this fascinating world.SponsorsSupport for this epi..
4 years, 6 months ago
0 Comments
64: The Athens Shadow Games
Vodafone Greece is the largest telecom provider in Greece. But in 2004 a scandal within the company would pin them to be top of the news cycle in Greece for weeks. Hackers got in the network. And what they were after took everyone by surprise.SponsorsSupport for this episode comes from Okta. Learn more about how you can improve your security postur..
4 years, 6 months ago
0 Comments