Darknet Diaries

Auteur(s): Jack Rhysider
  • Résumé

  • Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.

    Jack Rhysider
    Voir plus Voir moins
Épisodes
  • 153: Bike Index
    Jan 7 2025

    Have you ever got your bike stolen? In this episode we dive into the world of stolen bikes. Who does it and where do the bikes go? We talk with Bryan from Bike Index who investigates this.

    https://bikeindex.org

    Sponsors

    Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com.

    This show is sponsored by Flashpoint. As one of the largest private providers of threat intelligence, Flashpoint delivers what security teams need most: clarity. By combining cutting-edge technology with the expertise of world-class analyst teams, their Ignite platform gives organizations instant access to critical data, expertly analyzed insights, and real-time alerts —all in one seamless platform. To access one of the industry’s best threat data and threat intelligence, visit flashpoint.io today.

    Voir plus Voir moins
    1 h et 4 min
  • 152: Stacc Attack
    Dec 3 2024

    Jarett Dunn, AKA StaccOverflow, stole millions of dollars from a website called Pump Fun, and he wanted to do it in the most dramatic and theatrical way he could. His big heist is known as the “Stacc Attack”.

    https://x.com/STACCoverflow

    He has a merch store now freestacc.io.

    Sponsors

    Support for this show comes from Cobalt Strike. Cobalt Strike simulates real-world, advanced cyber attacks to enable red teams to proactively evaluate an organisation’s security readiness and defence response. Their Command and Control framework gives red teamers the ability to customise their engagements and incorporate their own tools and techniques, allowing you to stress-test specific parts of your incident response capabilities. Learn more about Cobalt Strike and get a custom demo at https://cobaltstrike.com/darknet.

    Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free.

    Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com.



    Voir plus Voir moins
    53 min
  • 151: Chris Rock
    Nov 5 2024

    Chris Rock is known for being a security researcher. But he’s also a black hat incident responder. He tells us about a job he did in the middle east.

    https://x.com/chrisrockhacker

    Sponsors
    Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet.

    Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free.

    Support for this show comes from Flare. Flare automates monitoring across the dark & clear web to detect high-risk exposure, before threat actors have a chance to leverage it. Their unified solution makes it easy to rapidly identify risks across thousands of sources, including developers leaking secrets on public GitHub Repositories, threat actors selling infected devices on dark web markets, and targeted attacks being planned on illicit Telegram Channels. Visit http://try.flare.io/darknet-diaries to learn more.

    Voir plus Voir moins
    58 min

Ce que les auditeurs disent de Darknet Diaries

Moyenne des évaluations de clients
Au global
  • 5 out of 5 stars
  • 5 étoiles
    3
  • 4 étoiles
    1
  • 3 étoiles
    0
  • 2 étoiles
    0
  • 1 étoile
    0
Performance
  • 4.5 out of 5 stars
  • 5 étoiles
    2
  • 4 étoiles
    0
  • 3 étoiles
    1
  • 2 étoiles
    0
  • 1 étoile
    0
Histoire
  • 5 out of 5 stars
  • 5 étoiles
    3
  • 4 étoiles
    0
  • 3 étoiles
    0
  • 2 étoiles
    0
  • 1 étoile
    0

Évaluations – Cliquez sur les onglets pour changer la source des évaluations.

Classer par :
Filtrer
  • Au global
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Histoire
    5 out of 5 stars

fantastic

the solid research and storytelling that goes into this podcast has made it an enjoyable listen on any of my commutes. I was turned on to this by my network security class and have never looked back. keep up the good work.

Un problème est survenu. Veuillez réessayer dans quelques minutes.

Vous avez donné votre avis sur cette évaluation.

Vous avez donné votre avis sur cette évaluation.

  • Au global
    4 out of 5 stars
  • Performance
    3 out of 5 stars
  • Histoire
    5 out of 5 stars

good story. touches on some basic principles

The story takes the time to explain some common terms that will make the story more consumable for non-technical audiences.

Un problème est survenu. Veuillez réessayer dans quelques minutes.

Vous avez donné votre avis sur cette évaluation.

Vous avez donné votre avis sur cette évaluation.

  • Au global
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Histoire
    5 out of 5 stars

excellent ! A écouter

très bien expliqué, j'aime beaucoup cette série et je la recommande fortement. l'importance de protéger ses données est primordiale

Un problème est survenu. Veuillez réessayer dans quelques minutes.

Vous avez donné votre avis sur cette évaluation.

Vous avez donné votre avis sur cette évaluation.

  • Au global
    5 out of 5 stars

one of the best podcasts

one of the best podcast ever listen. right i m on ep 52 following the jack from youtube and get it here. start my tech geek study due to your podcast man, thanks alot to bring this podcast show. its truly amazing 😍

Un problème est survenu. Veuillez réessayer dans quelques minutes.

Vous avez donné votre avis sur cette évaluation.

Vous avez donné votre avis sur cette évaluation.