logo
episode-header-image
Apr 2024
1h 2m

144: Rachel

Jack Rhysider
About this episode
Rachel Tobac is a social engineer. In this episode we hear how she got started doing this and a few stories of how she hacked people and places using her voice and charm. Learn more about Rachel by following her on Twitter https://twitter.com/RachelTobac or by visiting https://www.socialproofsecurity.com/ Daniel Miessler also chimes in to talk about AI ... Show More
Up next
Nov 4
165: Tanya
<p>Tanya Janca is a globally recognized AppSec (application security) expert and founder of We Hack Purple. In this episode, she shares wild stories from the front lines of cybersecurity. She shares stories of when she was a penetration tester to an incident responder.</p><p>You ... Show More
47m 43s
Oct 7
164: Oak Cliff Swipers
<p>He started small, swiping cards, buying gift cards, and cashing out. It spiraled into a full‑blown criminal enterprise. Dozens of co‑conspirators, stacks of stolen plastic, and a lifestyle built on chaos.</p><p>Meet Nathan Michael, leader of Oak Cliff Swipers.</p><h3>Sponsors< ... Show More
1h 28m
Sep 2
163: Ola
<p>In 2019, Ola Bini, a Swedish programmer and privacy advocate, was arrested in Ecuador for being a Russian hacker.</p><p>Find Ola on X: <a href="https://x.com/olabini"><strong>https://x.com/olabini</strong></a>. Or visit his website <a href="https://olabini.se/blog/"><strong>ht ... Show More
1h 22m
Recommended Episodes
Nov 2019
Kevin Mitnick - The World's Most Famous Hacker | Mystery and Murder: Analysis by Dr. Phil
<p>Cybersecurity expert and "the world's most famous hacker" Kevin Mitnick demonstrates some methods hackers use to access sensitive information, and gives valuable tips to keep yourself safe in the cyberworld. Dr. Phil says, "This is a time that it is really important because we ... Show More
1h 3m
Nov 2021
Stalkerware: Tech-enabled domestic abuse skyrocketing
<p>With the number of devices infected with stalkerware rising by over 60% in a year, many are worried about the consequences. Ivana Davidovic speaks with Maria who, even after managing to leave her abusive husband of 25 years, was still not free from his clutches.</p><p>Eva Galp ... Show More
17m 29s
Feb 2024
DOJ strikes justice.
The DOJ shuts down the Warzone rat. Ransomware hits over twenty Romanian hospitals, and Rysida gets a decryptor. Canada may ban the Flipper Zero. Chinese espionage claims against the US are light on facts. Australia looks to criminalize doxxing. Federal IT leaders seek better coo ... Show More
30m 31s
Jan 2024
The Growing Ransomware Threat: Targets, Insights, and Strategies with Halcyon's Jon Miller | E1877
<p>This Week in Startups is brought to you by…</p> <p>Scalable Path. Want to speed up your product development without breaking the bank? Since 2010, Scalable Path has helped over 300 companies hire deeply vetted engineers in their time zone. Visit <a href="http://www.scalablepat ... Show More
55m 53s
Jan 2024
Midnight Blizzard brings the storm.
Russian state hackers breach Microsoft. LockBit claims Subway restaurants hack. A Swedish datacenter is hit with ransomware. VMware patches a vulnerability targeted by Chinese espionage groups. Sentinel Labs warns of North Korean APTs focus on cybersecurity pros. FTC order anothe ... Show More
23m 59s
Sep 2022
Securing the Unstructured Castle: Protecting Your “Dark Data”
Every attorney knows to lock client secrets behind sophisticated cybersecurity. But as guest Rich Hale explains, the data that’s hiding in plain sight, “Dark Data,” is just as important to your client relationships and your reputation. After this important episode, you’ll want to ... Show More
42m 1s
May 2020
The Dark Secrets of a Hacking Hero
<p>In May of 2017, Marcus Hutchins saved the internet. A vicious ransomware attack known as WannaCry had infected computer systems across dozens of countries. It was the worst cyberattack in history at the time, and it seemed unstoppable. But Hutchins, a 23-year-old-hacker in Ilf ... Show More
30m 39s
Feb 2021
The War with Algorithms: Why Your Next Security Strategy Includes A.I. and Machine Learning
<p>The image of a hooded individual illuminated by the glare of a computer screen hacking into a company’s network is the classic picture of what a cyber attack looks like. The reality, though, is these attackers are almost never a one-man band, but rather a sophisticated team ar ... Show More
40m 57s