logo
episode-header-image
Jul 2021
53m 26s

96: The Police Station Incident

Jack Rhysider
About this episode

Nicole Beckwith wears a lot of hats. She’s a programmer, incident responder, but also a cop and a task force officer with the Secret Service. In this episode she tells a story which involves all of these roles.

https://twitter.com/NicoleBeckwith

Sponsors

Support for this show comes from IT Pro TV. Get 65 hours of free training by visiting ITPro.tv/darknet. And use promo code DARKNET.

Support for this show comes from Exabeam. Exabeam lets security teams see what traditional tools can’t, with automated threat detection and triage, complete visibility across the entire IT environment and advanced behavioral analytics that distinguishes real threats from perceived ones, so security teams stay ahead and businesses keep moving — without fear of the unknown. When the security odds are stacked against you, outsmart them from the start with Exabeam. Learn more at https://exabeam.com/DD.

View all active sponsors.

Sources

Up next
Jun 3
159: Vastaamo
Joe Tidy investigates what may be the cruelest and most disturbing cyber attack in history. A breach so invasive it blurred the line between digital crime and psychological torture. This story might make your skin crawl.Get more from Joe linktr.ee/joetidy.Get the book Ctrl + Alt ... Show More
51m 6s
May 6
158: MalwareTech
MalwareTech was an anonymous security researcher, until he accidentally stopped WannaCry, one of the largest ransomware attacks in history. That single act of heroism shattered his anonymity and pulled him into a world he never expected.https://malwaretech.comSponsorsSupport for ... Show More
1h 6m
Apr 1
157: Grifter
Grifter is a longtime hacker, DEF CON organizer, and respected voice in the infosec community. From his early days exploring networks to helping shape one of the largest hacker conferences in the world, Grifter has built a reputation for blending deep technical insight with a sha ... Show More
1h 17m
Recommended Episodes
Sep 2022
How To Protect Yourself From Social Engineering Hacks
Hacks are increasing but the hackers are not necessarily getting more sophisticated. What do Twitter, Twilio, and Uber all have in common? They were all hacked by, in part, a conversation. In all three cases, the hack was helped along by social engineering. Someone contacted an e ... Show More
29m 32s
Jul 2022
#389: Murder in Slow Motion™️: Connie Dadkhah
Connie Dadkhah lived alone in her Rancho Penasquitos condo and had neighbors who cared about her. When they saw an angry man pounding on her front door, tampering with her electrical box, breaking into her balcony window and heard what sounded like a violent fight, they placed 12 ... Show More
43m 11s
Nov 2019
Kevin Mitnick - The World's Most Famous Hacker | Mystery and Murder: Analysis by Dr. Phil
Cybersecurity expert and “the world’s most famous hacker” Kevin Mitnick demonstrates some methods hackers use to access sensitive information, and gives valuable tips to keep yourself safe in the cyberworld. Dr. Phil says, "This is a time that it is really important because we're ... Show More
1h 3m
Apr 2021
Why Your Ecommerce Platform is Still at Risk, with Otto Founder and CEO, Maggie Louie
Maggie Louie remembers the moment her career changed forever. Working with the L.A. Times on digital and mobile products, Maggie, now the founder and CEO of Otto, remembers a friend asking her to look into an issue they were having with their website.“[they asked] me to look at t ... Show More
47m 52s
Mar 2022
The Rise of the Hacking Group LAPSUS$
It started with SIM swapping and escalated into hacks of Okta, Microsoft, Nvidia, and EA. They’re LAPSUS$, a hacking collective that’s been the boogeyman of big corporations for the past few years. People have wondered about their motivations and identities. Now, seven of them ha ... Show More
33m 17s
Feb 2021
The War with Algorithms: Why Your Next Security Strategy Includes A.I. and Machine Learning
The image of a hooded individual illuminated by the glare of a computer screen hacking into a company’s network is the classic picture of what a cyber attack looks like. The reality, though, is these attackers are almost never a one-man band, but rather a sophisticated team armed ... Show More
40m 57s
Feb 2024
Episode 15: Patrick Rus
OSINT Cocktail is a podcast about the tools of the trade for online investigations. Whether you are a new investigator, a seasoned professional, or even in an adjacent field such as investigative journalism, sourcing, or marketing, we will be interviewing professionals to find ou ... Show More
32m 44s
Apr 2019
Poisoned porn ads, the A word, and why why why Wipro?
The hacker who lived the high life after spreading malware via porn sites, Wipro demonstrates how to turn a cybersecurity crisis into a PR disaster, and why are humans listening in to your Alexa conversations?All this and much much more is discussed in the latest edition of the " ... Show More
52m 41s
Jan 2024
#488: The Exploitation of Natalia Grace | Part 2
We continue our discussion about Natalia Grace, her life as far as we know it and the case built against her by her adoptive parents Michael and Kristine Barnett who claimed Natalia was a manipulative, dangerous, sociopath posing as a child while actually being a full grown adult ... Show More
55m 42s