Hackers to Founders

Auteur(s): Chris Magistrado
  • Résumé

  • I'm Chris (REal0day) Magistrado, hacker who interviews hackers, entrepreneurs, community builders, and investors. https://HackersToFounders.com
    © 2024 Red Security Global Corporation
    Voir plus Voir moins
Épisodes
  • Ep. 18 - Eliminating Human Errors w/ Patrick Thomas
    Mar 21 2025

    What if AI-powered security could eliminate human errors in cybersecurity? Meet the founder making it happen.

    In this episode of Hackers to Founders, I sit down with Patrick Ben Thomas, the founder of NullZec and its advanced malware development division, Shadow Mask. Patrick shares his journey from early cybersecurity research to building a solution designed to eliminate human errors and prevent malware from spreading. We discuss how his team integrates sandboxing, zero-trust architecture, and in-house malware analysis to isolate and detect threats before they reach end users. He also dives into the offensive research behind Shadow Mask, where they develop real-world exploits to strengthen defenses. Tune in to learn how Patrick is blending adversary simulation with next-gen defense strategies to reshape cybersecurity.

    People

    • Patrick Ben Thomas (Guest, Founder of NullZec & Shadow Mask)
    • Kevin Mitnick (Famous hacker, cybersecurity expert)

    Companies & Organizations

    • NullZec (Parent company founded by Patrick Ben Thomas)
    • Shadow Mask (Malware development & adversary simulation division under NullSec)

    Products & Technologies

    • HackRF (Software-defined radio device used for security research)
    • BladeRF (Full-duplex SDR used for radio frequency security research)
    • Proxmark 3 (RFID/NFC security tool for cloning and emulation)
    • Flipper Zero (Multi-tool for hardware and RF hacking)
    • NFC Kill (Device used to destroy NFC-enabled cards by electromagnetic pulse)

    Cybersecurity Events & Conferences

    • DEFCON (Hacker conference)
    • Black Hat (Cybersecurity conference)
    • BSides (Security conference, mentioned as besides)
    • RSA Conference (Cybersecurity event)

    Cybersecurity Services & Platforms

    • VirusTotal (Malware analysis service, mentioned as insufficient for zero-day threats)
    Voir plus Voir moins
    1 h et 13 min
  • Ep. 17 - How AI is Changing OSINT, Dark Web Investigations, and Fraud Detection w/ Zara Perumal
    Feb 21 2025
    What if AI could predict and prevent cyber fraud before it happens? Meet the founder making it possible " On this episode of Hackers to Founders, we feature Zara Perumal, the CTO and co-founder of Overwatch Data. The episode explores Zara’s journey from an early fascination with computer science, influenced by her software developer father, to her evolution into a cybersecurity and AI entrepreneur. Zara recounts her first steps into coding, beginning with HTML at age 11 and later developing iOS apps, which sparked her passion for building technology. She reflects on her experiences at MIT, where she explored bioinformatics, machine learning, and eventually cybersecurity, which became a turning point in her career. Her work at Google’s Threat Analysis Group further deepened her understanding of digital threats, leading her to the realization that she wanted to create a company addressing cybersecurity challenges at scale.The episode then shifts focus to Overwatch Data, where Zara details the company's mission to harness AI to process OSINT (open-source intelligence) and provide actionable insights for businesses. She describes the challenges of collecting and analyzing data from the dark web and fraudulent networks, explaining how Overwatch leverages automation and investigative techniques to detect threats and fraud. She also discusses the business side of the startup, from finding the right market fit to the importance of customer feedback in shaping their solutions. Throughout the conversation, Zara and host Chris Magistrado delve into the complexities of cybercrime, the evolving threat landscape, and the role of AI in modern threat intelligence, offering listeners a fascinating look into the intersection of security, AI, and entrepreneurship.PeopleZara Perumal – CTO and Co-founder of Overwatch Data, specializing in AI-driven cybersecurity.Chris Magistrado – Host of Hackers to Founders, interviewing tech and security entrepreneurs.Arjun Bisen – CEO and Co-founder of Overwatch Data who initially had the idea for the company.Ron Rivest – Renowned cryptographer and MIT professor who influenced Zara’s interest in cybersecurity.Michael (YC Advisor) – Advisor at Y Combinator who guided Overwatch Data through its early stages.Companies & OrganizationsOverwatch Data – A cybersecurity startup leveraging AI to process OSINT and detect fraud.MIT CSAIL – MIT’s Computer Science and Artificial Intelligence Laboratory where Zara conducted research.Harvard Belfer Center – A research institute focused on security, where Zara contributed to digital democracy defense.Akamai – A cloud and cybersecurity company where Zara gained experience in software and data analytics.NASDAQ – A major stock exchange where Zara worked in technology roles.Apple – Technology company where Zara developed software.Y Combinator – Startup accelerator that backed Overwatch Data.Corellium – A company providing a virtualization platform for mobile security research.Technologies & ToolsObjective-C – Programming language used for iOS app development before Swift.Swift – Modern programming language for Apple’s ecosystem.React Native – A framework for building cross-platform mobile applications.Flutter – Google’s UI toolkit for natively compiled mobile apps.JADX – A tool for reverse-engineering Android applications.Telegram – Messaging platform heavily used by cybercriminals for fraud and illicit activities.GPT (ChatGPT) – AI tool used for scripting and automating analysis tasks.DeepSeek – An AI tool discussed for its open-source implications.Magic Eye – A bot used for detecting duplicate images on Reddit.Corellium – A mobile security research platform used for analyzing malware.Cybersecurity & HackingOSINT (Open-Source Intelligence) – Intelligence gathered from publicly available sources.Dark Web – A hidden part of the internet where illicit cyber activities and fraud take place.SIM Swapping – A fraud technique where hackers take over phone numbers to gain access to accounts.Credential Stuffing – A hacking technique using stolen username-password combinations.PDF Malware – Malicious software hidden in PDFs, which Zara researched in academia and at Google.Null Market (Nulled) – A recently taken-down dark web forum used for cybercrime.DNM (Dark Net Marketplaces) – Online platforms for buying and selling illicit goods.Grams – A dark web search engine that indexed darknet marketplaces.MD5 Hashing – A cryptographic technique used to verify digital signatures.
    Voir plus Voir moins
    1 h et 17 min
  • Ep. 16 - The Birth of the CVE System, created by Adam Shostack
    Jan 29 2025
    Who created the CVE system? That's Adam! In this insightful episode of "Hackers to Founders," host Chris REal0day Magistrado welcomes Adam Shostack, a renowned cybersecurity expert and co-creator of the Common Vulnerabilities and Exposures (CVE) system. Adam recounts his journey from a curious and geeky childhood, engaging in activities like D&D and building with Legos, to his influential career in cybersecurity. He delves into his early experiences at Brigham and Women's Hospital, where he first encountered the importance of security and privacy in medical systems. Adam shares his entrepreneurial ventures, including his pivotal roles in startups like Net Tech and Zero Knowledge Systems, highlighting the challenges and rewards of building security-focused businesses during the nascent stages of the cybersecurity industry. His passion for threat modeling is evident as he discusses his work at Microsoft, where he developed user-friendly threat modeling tools and authored influential books to make security practices more accessible.Beyond his technical achievements, Adam emphasizes the significance of education, training, and mentorship in advancing cybersecurity. He explains his transition from product development to focusing on training and creating scalable educational programs, ensuring that essential security skills are widely disseminated. Adam also explores his collaboration with Cyber Green to establish cyber public health, aiming to apply public health methodologies to measure and mitigate cyber impacts effectively. Throughout the conversation, Adam underscores the importance of diversity in fostering innovative solutions and the need for adaptable strategies in an ever-evolving threat landscape. His dedication to making cybersecurity more inclusive and his visionary approach to integrating interdisciplinary techniques position him as a key thought leader committed to enhancing global security practices.PeopleAdam Shostack: Renowned cybersecurity expert, co-creator of the Common Vulnerabilities and Exposures (CVE) system, author of several influential books on threat modeling and security design.Frank Abagnale: Subject of the book "Catch Me If You Can," which influenced Adam's childhood interest in security and deception techniques.Leonardo DiCaprio: Actor who portrayed Frank Abagnale in the movie adaptation of "Catch Me If You Can."Mike Howard: Worked alongside Adam on the Secure Development Lifecycle team.Steve Lipner: Collaborated with Adam on threat modeling initiatives.Rob Kinnaki: Worked with Adam on the cyber public health project, contributing to the development of new cybersecurity disciplines.Tara Wheeler: Partnered with Adam in establishing cyber public health methodologies.Heidi Trust: Recommended by Adam as a notable figure intersecting usability and security.Gene Spafford: Part of Adam's professional network, contributing to cybersecurity discourse.Steve Belvin: Known to Adam, part of his network of cybersecurity professionals.Bruce Schneier: Part of Adam's extensive network within the cybersecurity community.Marcus Ranham: Known to Adam, contributing to his professional relationships.Mudge: Met by Adam during his time at BBN, part of his influential network.Weld Pond: Met by Adam at BBN, contributing to his professional connections.Prerit Garg: Contributor to threat modeling methodologies.Lance Cottrell: Influenced Adam's work on anonymized networks at Zero Knowledge Systems.Paul Syverson: Co-inventor of onion routing. His work influenced the development of anonymized network systems like Tor and Zero Knowledge Systems.Steve Christie: Involved in the development of the CVE system.Dave Mann: Collaborated with Adam on creating the CVE system.Andre Fresh: Worked with Adam on developing the CVE system.Tony Sager: Helped secure funding for the CVE system through collaboration with MITRE.Stephen Savage: Involved in ransomware detection research, mentioned in relation to cyber public health.OrganizationsCVE (Common Vulnerabilities and Exposures): A standardized system for identifying and categorizing cybersecurity vulnerabilities. Co-created by Adam Shostack to provide a common reference for vulnerabilities across different platforms and organizations.Net TechStartup focused on developing vulnerability scanners. Adam played a pivotal role in this successful startup, contributing to the creation of security tools.Zero Knowledge Systems: Startup aimed at creating anonymized network solutions similar to Tor. Adam joined this company to work on privacy-focused technologies.MITRE: Not-for-profit organization that manages various federally funded research and development centers. Collaborated with Adam to develop and support the CVE system.Secure ID: Company that produced authentication tokens. Adam conducted security and privacy reviews of their products early in his career.BBN (Bolt Beranek and Newman Inc.) Technology company known for its work on ARPANET and early internet infrastructure. ...
    Voir plus Voir moins
    1 h et 43 min

Ce que les auditeurs disent de Hackers to Founders

Moyenne des évaluations de clients

Évaluations – Cliquez sur les onglets pour changer la source des évaluations.