Episodes (Page 2)
✨
Chris Rock, security researcher and black hat incident responder, shares Middle East operation
✨
Re-examination of Episode 20 featuring 'mobman' who claimed to create Sub7 malware
✨
EvilMog shares story of network troubleshooting challenges in Afghanistan
✨
Teenagers attempted to obtain unreleased dubstep tracks before official release
✨
Geoff White covers Axie Infinity digital heist and Tornado Cash money laundering case
✨
Joseph Cox discusses ANOM, a secure phone created by criminals for criminal use
✨
Shannen Rossmiller pursued terrorism fighters online through investigative work
✨
Rachel Tobac is a social engineer who uses voice and charm to breach security
✨
Jim Browning infiltrates scammer computer systems and publicly exposes their operations on YouTube
✨
Axact operates a business selling fake diplomas and degrees to customers
✨
Pig butchering is the second-largest crime by financial loss after BEC fraud
✨
Madison's revenge porn case where intimate photos were posted online without consent
✨
D3f4ult from CWA was a hacktivist upset with the status quo seeking systemic change
✨
Tarun shares his personal experience being targeted by scammers in the Punjab region
✨
Predator is a new mercenary spyware that infects mobile phones and extracts all data
✨
Team Xecuter created and sold modchips enabling video game piracy and unauthorized play
✨
Omar Avilez worked in Dominican Republic's CSIRT during a major cyber security incident
✨
Deviant Ollam is a physical penetration specialist hired to test building security
✨
Connor Tumbleson receives notification that his identity has been stolen
✨
Sam Bent (DoingFedTime) shares his experiences as a darknet market vendor