Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
…
continue reading
Jack Rhysider Podcasts
I'm fascinated by what happens in the dark parts of the Internet. Come with me and let's shine some light on it and see what's there.
…
continue reading
"What the Hack?" is the award-winning true cybercrime podcast--the place to hear memorable stories and get good advice.
…
continue reading
Ann Johnson, Corporate Vice President and Deputy Chief Information Security Officer at Microsoft, talks with cybersecurity thought leaders and influential industry experts about the trends shaping the cyber landscape and what should be top-of-mind for the C-suite and other key decision makers. Ann and her guests explore the risk and promise of emerging technologies, as well as the impact on how humans work, communicate, consume information, and live in this era of digital transformation. Ple ...
…
continue reading
Empowering Your IT Career Journey – From the first step to success! With a passion for technology and a mission to uplift others, I’m here to guide you through the dynamic IT industry. Whether you're just starting or looking to advance, you’ve found a community dedicated to your growth. Advice & Insights: From Help Desk to Director of Network Operations in 3 years, I share strategies to fast-track your career. Expert Conversations: Gain exclusive insights from industry leaders. Let’s make IT ...
…
continue reading
Cybersecurity careers, education, resources, and more with Gotham Sharma.
…
continue reading
Conversation hosted by writer, technologist and award-winning music producer Giulio "Julyo" D'Agostino with friends and guests that include hackers, artists, entrepreneurs, celebrities and beyond.
…
continue reading
The founders of Chartable discuss all things podcasting, interview podcasters and dish the best advice on how to market and grow your podcast.
…
continue reading
I'm Chris (REal0day) Magistrado, hacker who interviews hackers, entrepreneurs, community builders, and investors. https://HackersToFounders.com
…
continue reading
The podcast that brings you the very best in all things, cybersecurity, taking an in-depth look at the most pressing issues and trends across the industry. Connect with us on our LinkedIn page! - https://www.linkedin.com/company/security-masterminds-podcast/
…
continue reading
We are a group of friends that have worked in Public Safety in one way or another for most of our lives. We have long talked about starting a podcast to cover those things that not many shows will talk about. We also want to talk about and share our personal experiences with others in the hope that maybe we can help them learn from our experiences.
…
continue reading
Welcome to Buzzsprout Conversations, the show where we dive into the real-life stories of podcasters in the middle of their podcasting journey. You'll hear stories from famous podcasters as well as everyday podcasters, just like you, share stories about how podcasting has impacted them and the things they've learned.
…
continue reading
Every week, we take a bite-sized look at legal and economic developments in locales around the world as we try to decipher global trends in law and business with the help of our international guests. No topic is too big, too small, too simple, or too complicated. We plan to cover continents, countries, regimes, governance, finances, legal developments, and whatever is trending on Twitter. Connect with us: - https://twitter.com/globallawbiz - https://www.linkedin.com/company/harris-bricken - ...
…
continue reading

1
You'll Never Trust Another USB Cable After Hearing This 🐍 Darknet Diaries | Ep. 161: MG
1:11:58
1:11:58
Play later
Play later
Lists
Like
Liked
1:11:58What if a USB cable could take complete control of your PC or phone? Hackers use them. Governments are using them. And it's all thanks to one security pro known only as "MG." Visit https://darknetdiaries.com/episode/161/ for a list of sources, full transcripts, and to listen to all episodes. ... https://www.youtube.com/watch?v=W81oWOf_RiE…
…
continue reading

1
Encore: Cybercrime and Storytelling with Jack Rhysider
32:18
32:18
Play later
Play later
Lists
Like
Liked
32:18Please enjoy this encore episode of Afternoon Cyber Tea while Ann Johnson and team are taking a break. Jack Rhysider, the creator and host of cybersecurity podcast Darknet Diaries joins Ann on this week's episode of Afternoon Cyber Tea. Jack shares his journey from network security engineer to self-taught storyteller, detailing how his passion for …
…
continue reading
In this episode we talk with mg (https://x.com/MG), the brilliant (and notorious) hacker and hardware engineer behind the OMG Cable. A seemingly ordinary USB cable with extraordinary offensive capabilities. Learn more about mg at: o.mg.lol Sponsors Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Pla…
…
continue reading
Join Ben Winters, director of AI and Privacy at the Consumer Federation of America, for a front-row seat to the chaotic world of AI regulation where dirty data, aggressive lobbying, and public confusion drive a "winner takes all" vibe. From shady therapy bots to data-fueled discrimination, Ben reveals the urgent need to create guardrails for AI bef…
…
continue reading

1
Episode 207: Kristen and the Phantom Puppy
36:17
36:17
Play later
Play later
Lists
Like
Liked
36:17Kristin got scammed because she didn't want to give a puppy mill her business. This classic digital scam has it all: fake breeders, phony shipping agents, and a non-existent air-conditioned crate. Kristen reveals how her scammers used trust, urgency and emotion, to close the deal. Listen to her story and what you can do to avoid getting duped yours…
…
continue reading

1
They Hired Me to Steal a Shopping Cart Full of Human DNA 🧬 Darknet Diaries Ep. 160: Greg
1:37:59
1:37:59
Play later
Play later
Lists
Like
Liked
1:37:59Greg Linares (AKA Laughing Mantis) shares his hunts for Zero Day exploits, the triple(?) agent working at Microsoft, how he became the youngest hacker ever arrested in Arizona, and that time a client hired him to steal human DNA. Follow Greg on Twitter: https://x.com/Laughing_Mantis. Visit https://darknetdiaries.com/episode/160 for a list of source…
…
continue reading

1
99: An Unfiltered Conversation with Network Chuck
1:03:01
1:03:01
Play later
Play later
Lists
Like
Liked
1:03:01In this episode of the IT Career Podcast, I sit down with Network Chuck for a raw, unfiltered conversation about tech, career growth, burnout, content creation, certifications, and the real behind-the-scenes life of one of YouTube’s biggest tech creators.Whether you're just starting your IT journey or you're a seasoned professional, this episode is…
…
continue reading

1
Machine-Scale Defense and the Future of Cybersecurity
29:50
29:50
Play later
Play later
Lists
Like
Liked
29:50Jeetu Patel, President and Chief Product Officer at Cisco, joins Ann on this week's episode of Afternoon Cyber Tea to explore how artificial intelligence is reshaping the cybersecurity landscape. Jeetu shares insights on the urgent need for machine-scale defenses, the potential for defenders to finally tip the scale against attackers, and the impor…
…
continue reading
Greg Linares (AKA Laughing Mantis) joins us to tell us about how he became the youngest hacker to be arrested in Arizona. Follow Greg on Twitter: https://x.com/Laughing_Mantis. Sponsors Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. …
…
continue reading

1
Episode 206: Chris Hutchins’s Travel Hacking Gets Hacked
44:55
44:55
Play later
Play later
Lists
Like
Liked
44:55If you have never listened to Chris Hutchins explain how to get free travel, you’ve probably been paying too much for your vacations. Turns out, a threat actor was listening to him and stole his miles. Download this week’s episode to hear how he hacked the situation to score even more points. (This episode originally airdropped September 26, 2022.)…
…
continue reading

1
Episode 205: Cybersecurity Girl Caitlin Sarian Tries to Delete Herself Online
34:42
34:42
Play later
Play later
Lists
Like
Liked
34:42Every part of life that comes in contact with the Internet is tracked, packed and sold to a a seemingly infinite network of data brokers. Caitlin Sarian AKA Cybersecurity Girl joined us this week to discuss why scrubbing your information is trickier than it sounds and what you can do about it.By DeleteMe
…
continue reading

1
The Human Firewall: People-First Cybersecurity
33:03
33:03
Play later
Play later
Lists
Like
Liked
33:03Dr. Aleise McGowan, Chief Information Security Officer of BlackGirlsHack and a 20-year cybersecurity veteran, joins Ann on this week's episode of Afternoon Cyber Tea. Aleise shares how a career-defining hack early on shifted her trajectory from developer to defender, and why she believes the future of security lies in resilience, diversity, and hum…
…
continue reading

1
Episode 204: Nicole Perlroth Says All the Things that Keep Adam Up at Night
49:04
49:04
Play later
Play later
Lists
Like
Liked
49:04Nicole Perlroth’s book This Is How They Tell Me the World Ends is a masterpiece on the topic of cyberwar and the zero-day hacks that make it deadly. Join us as we explore with Perlroth a cyberscape where mistakes are weaponized, backdoors abound and we all have zero degrees of separation from spies and the people they spy on.…
…
continue reading

1
98: This CTO Changed How I Think About Network Monitoring
19:15
19:15
Play later
Play later
Lists
Like
Liked
19:15Get Total Network Visibility today and better understand your network: https://itdad.info/pathsolutionsIn this episode, I sit down with Tim Titus, CTO of @PathSolutions , live from the floor at Cisco Live—the world’s biggest networking conference. We dive into the evolution of network monitoring and why the tools you choose can make or break not ju…
…
continue reading

1
Episode 203: Jack Rhysider Exposes Our Digital Secrets
44:30
44:30
Play later
Play later
Lists
Like
Liked
44:30What if your digital footprint made you a target? Jack Rhysider, host of "Darknet Diaries," shares how a fan turned his online presence into a personal puzzle—revealing just how easily your privacy can be pieced together and exploited.By DeleteMe
…
continue reading

1
97: From ZERO Tech Experience to QA Engineer (Real Story)
39:49
39:49
Play later
Play later
Lists
Like
Liked
39:49Check out everything Careerist has to offer: https://crst.co/K0LtWThe speaker highlights that it's never too late for a career transition, even after 30, and that your job doesn't define your identity. There are many courses after bds abroad and bootcamps available that make it possible to improve your life. Changing your career change can be an in…
…
continue reading

1
96: The Story Behind Darknet Diaries - W Jack Rhysider
1:03:54
1:03:54
Play later
Play later
Lists
Like
Liked
1:03:54Unlock your dream job in IT with our proven community: https://itcareerjob.com/Jack Rhysider is the creator and voice behind Darknet Diaries, one of the most compelling podcasts in the cybersecurity world. But before the podcast, before the half-million downloads per episode, and before the NSA came knocking with stories of their own—Jack was just …
…
continue reading
Yonatan Zunger, Corporate Vice President and Deputy Chief Information Security Officer for Artificial Intelligence at Microsoft joins Ann on this week's episode of Afternoon Cyber Tea. They dive into the evolving cybersecurity landscape shaped by generative and agentic AI, discussing both the opportunities and the risks. Yonatan shares insights on …
…
continue reading

1
The nastiest, cruelest cyber attack in history🎙Darknet Diaries Ep.159: Vastaamo
51:06
51:06
Play later
Play later
Lists
Like
Liked
51:06Some hackers steal your credit card. Others might snoop through your Web history. But what if your deepest, darkest secrets — the ones you only tell your therapist — were suddenly on the Internet, for anyone to read? When one of Finland's largest psychotherapy companies was breached, the stakes were so high that police worked around the clock hunti…
…
continue reading
Joe Tidy investigates what may be the cruelest and most disturbing cyber attack in history. A breach so invasive it blurred the line between digital crime and psychological torture. This story might make your skin crawl. Get more from Joe linktr.ee/joetidy. Get the book Ctrl + Alt + Chaos: How Teenage Hackers Hijack the Internet (https://amzn.to/3H…
…
continue reading

1
Episode 202: Shannon Edwards Reveals the Student Data Free-for-All in New York City Schools
42:26
42:26
Play later
Play later
Lists
Like
Liked
42:26As technology is integrated deeper into classrooms, the lines between education and data privacy have been destroyed by for-profit data miners. This week, privacy advocate Shannon Edwards reveals how educational apps harvest sensitive information from children, commodify their data, and what parents can do to fight it.…
…
continue reading

1
95: Are LinkedIn and GitHub Making Tech Jobs Unattainable?
1:08:58
1:08:58
Play later
Play later
Lists
Like
Liked
1:08:58Save 40% on Coursera Plus for 3 Months: https://imp.i384100.net/c/1341007/2942209/14726Learn about the secrets of hiring and how companies sometimes create job positions for the right candidate, even if there aren't any official openings. This episode offers useful career advice and touches on the importance of cultural fit when assessing candidate…
…
continue reading

1
Hugh Thompson on Building the RSA Conference
37:34
37:34
Play later
Play later
Lists
Like
Liked
37:34Dr. Hugh Thompson, Executive Chairman of RSA Conference and Managing Partner at Crosspoint Capital joins Ann on this week's episode of Afternoon Cyber Tea. They discuss what goes into planning the world’s largest cybersecurity conference—from theme selection to llama-related surprises on the expo floor—and how the RSA community continues to evolve.…
…
continue reading

1
Episode 201: Keren Elazari Decrypts the Ransomeware Nightmare
41:41
41:41
Play later
Play later
Lists
Like
Liked
41:41Ransomware is a type of malware that allows hackers to commandeer data on a device or an entire network. Increasingly, the threat actors behind these crimes set their sites on mission critical targets. We talked about it with renowned cybersecurity expert Keren Elazari this week.By DeleteMe
…
continue reading

1
94: Why This Network Engineer Left It All to Build Something Bigger
35:42
35:42
Play later
Play later
Lists
Like
Liked
35:42$1000 OFF ANY Springboard Tech Boot camps with my code THEBEARDEDITDAD. See if you qualify for the JOB GUARANTEE! 👉 https://itdad.info/springboardJoin me as I chat with Anil Varanasi, an experienced network engineer who shares his journey from studying at George Mason to mastering networking fundamentals in the field. Through career guidance and pr…
…
continue reading

1
Episode 200: The Wild West of the Loophole Economy
50:13
50:13
Play later
Play later
Lists
Like
Liked
50:13We’ve all been there. You see something perfect online, you do all the clicks and then think, “Wait, was that legit?” Scam-lite transactions are the way of the web these days, whether it’s direct-from-manufacturer or super-sticky subscriptions, we have your back.By DeleteMe
…
continue reading

1
93: This Overlooked Job Leads to Every Tech Career
37:10
37:10
Play later
Play later
Lists
Like
Liked
37:10Start the FREE I.T. Introduction Course with CourseCareers Now: https://coursecareers.com/a/thebeardeditdad?course=itAre you unknowingly killing your tech career before it even starts?In this video, I break down the most overlooked job that opens doors to nearly every tech career — from cybersecurity and networking to cloud, DevOps, and beyond.Whet…
…
continue reading

1
Meet the Guy Who Accidently Stopped the World's Most Dangerous Ransomware ☠ Ep. 158 MalwareTech
1:06:33
1:06:33
Play later
Play later
Lists
Like
Liked
1:06:33MalwareTech was an anonymous young security researcher, until he stumbled upon the command and control server for WannaCry, a Windows exploit developed by the NSA and weaponized by North Korea (probably). When he registered the domain, he inadvertently hit the kill switch for this terrifying ransomware - and exposed his identity to the entire world…
…
continue reading
On this special episode of Afternoon Cyber Tea, Ann brings listeners inside the 2025 RSA Conference to explore the intersection of AI, quantum computing and cyber resiliency with two visionary experts: Massachusetts Institute of Technology’s Vinod Vaikuntanathan and Dr. Sasha O’Connell from The Aspen Institute. Vinod shares how quantum computing po…
…
continue reading
MalwareTech was an anonymous security researcher, until he accidentally stopped WannaCry, one of the largest ransomware attacks in history. That single act of heroism shattered his anonymity and pulled him into a world he never expected. https://malwaretech.com Sponsors Support for the show comes from Black Hills Information Security. Black Hills h…
…
continue reading

1
Episode 199: CISA Director Jen Easterly Stands Watch in the Cyberwars
43:11
43:11
Play later
Play later
Lists
Like
Liked
43:11From elections to ransomware, CISA Director Jen Easterly breaks down the threats to America’s critical infrastructure and what’s being done to stop them, sharing along the way her journey from the real-life battlefield to the frontlines of cybersecurity. This is a rare glimpse into the most pressing threats America faces—and a compelling story abou…
…
continue reading

1
92: How Tech Experts Accidentally Kill Their Own Careers
30:14
30:14
Play later
Play later
Lists
Like
Liked
30:14Save 40% on Coursera Plus for 3 Months: https://imp.i384100.net/c/1341007/2942209/14726You’ve got the skills. You’ve put in the work.But despite your experience, you’re still being passed over… Why?In this episode, I sit down with public speaking coach Geoffrey Huck to uncover the silent career killer that holds back even the smartest tech pros: co…
…
continue reading

1
Episode 198: Cory Doctorow Makes Us Wonder if Everything’s a Scam
42:19
42:19
Play later
Play later
Lists
Like
Liked
42:19Think you’re too savvy to get scammed? Author and activist Cory Doctorow explains how we’re all one muffaletta and a malfunctioning jet door away from falling prey to the most basic of cons. He joins us this week to talk about that and to fill us in about his new book, “The Bezzle.”By DeleteMe
…
continue reading

1
91: Helping Cybersecurity Pros Land Dream Jobs - With Kenneth Ellington
38:11
38:11
Play later
Play later
Lists
Like
Liked
38:11Want to land a cybersecurity job? Start with hands-on training from TryHackMe: https://tryhackme.com/why-subscribe?utm_source=youtube&utm_medium=social&utm_campaign=dakota_21aprilIn this episode, I sit down with Kenneth Ellington, cybersecurity instructor and founder of Ellington Cyber Academy, to break down how to build a high-paying career in cyb…
…
continue reading