I'm not a big podcast follower, but I just discovered Darknet Diaries today, a seemingly fantastic podcast that explores the world of hackers, cybercrime, etc. The first episode that I listened to had me nearly rolling on the floor because the situation surrounding an unintended breach was so eye rolling. At the same time it was a solid lesson to organizations that do not commit resources to their cybersecurity posture. If you're enjoy the tech world, hacking, or just a good podcast, I would recommend giving it a listen.
Michael Ortman’s Post
More Relevant Posts
-
If you're looking for a cyber podcast to learn more about the latest in cybercrime and all that's hiding on the network, check out Darknet Diaries. #DarknetDiaries #CyberPodcast #PearlTechnology #Cybersecurity
Darknet Diaries – True stories from the dark side of the Internet.
darknetdiaries.com
To view or add a comment, sign in
-
In honor of Cybersecurity Month, I wanted to share resources that have helped grow my knowledge base in an entertaining/interesting way... Here are four fantastic resources that can help you deepen your understanding and stay ahead of the curve: 🎙️ Podcasts: Darknet Diaries Dive into the world of hacking, data breaches, and cybercrime with compelling storytelling. Each episode reveals fascinating real-life tales that will keep you on the edge of your seat! https://lnkd.in/gEabeAiB Malicious Life Explore the history of cybersecurity through captivating stories of hackers, cyber threats, and the evolution of technology. This podcast offers insights that are both educational and entertaining. https://lnkd.in/gNN2_A_P 🌐 Websites: Reuters Cybersecurity Stay updated with the latest news, trends, and analysis in the cybersecurity realm. Reuters provides in-depth reporting on emerging threats and industry developments, making it a must-follow for professionals. https://lnkd.in/grMJx2Pt Bruce Schneier's Newsletter Renowned security technologist Bruce Schneier shares his insights on security issues, policy, and technology through his newsletter. It’s a great way to stay informed about critical developments in cybersecurity. By leveraging these resources, you can enhance your knowledge and contribute to a safer digital environment. Let’s keep the conversation going! https://lnkd.in/gJ3spdZF What are some of your favorite cybersecurity resources? 💬 #Cybersecurity #Podcasts #Learning #DarknetDiaries #MaliciousLife #Reuters #BruceSchneier #StaySafeOnline
Darknet Diaries – True stories from the dark side of the Internet.
darknetdiaries.com
To view or add a comment, sign in
-
I've been listening to this podcast called Darknet Diaries during my workouts and walks lately It is a series by a gentleman named Jack Rhysider The podcast is an investigated show meant to dive into real events in cybersecurity, specifically about people's experiences in areas considered "dark net" These include moments like a high school student who got all of the principal's passwords (including their personal Twitter account) because of their insecure drive on the network, teams hired by countries to spy on others, and how organisations track down criminals stealing money Every episode is different and offers a different takeaway. Episode 5 tells the story of how a man dived into how much exposure a line of ASUS routers came with by default. Including, but not limited to, accessing FTP servers remotely that contained the username and password to the router's settings. A standard example of the types of attacks routers are vulnerable if set by people who don't understand what they are enabling Episode 14 tells the story of how a hospital was hacked because of news reports of a girl's parents who weren't allowed to take/see their child. This sparked public outrage and led to groups like Anonymous attacking the hospital and causing technical issues with hospital equipment regardless of how they were being used at the time. The story with the little girl turned out to be exaggerated but the damage was already done. It's a creepy way to show how mobs cause damage even through hacking Episode 31 goes into the "Subscribe to PewDiePie" campaign (one that I remember from college) and how someone used their minimum knowledge of hacking to cause 50,000 printers around the world to print whatever they wanted. The very same person who conducted the attack even speaks on it and explains how they got caught up in their online attention to the point that they exposed too much of themselves and got into trouble. It was interesting to hear how they had to determine if their attack was successful by searching on Twitter for people posting asking why their printer is suddenly printer "Subscribe to PewDiePie" The podcast has almost 150 episodes to date and is not ending soon Personally I recommend it as a way to have an ear open in the area of cybersecurity. Learning different operating systems, best security practices, and even how to hack are all perfectly good ways to get into the field. But it is also good to get exposure to what is happening in the real world and how it is impacting people small and large. By learning what has happened or is happening, I can not only learn what is theoretically possible but also UNDERSTAND what is possible You can find the series on Spotify, YouTube, or their website: https://lnkd.in/g7rKHZ9z
Darknet Diaries – True stories from the dark side of the Internet.
darknetdiaries.com
To view or add a comment, sign in
-
Looking to break into the field of cyber security? We understand that the industry can seem daunting, making it challenging to know where to begin your educational journey. Fortunately, there's a fantastic starting point that requires no prior knowledge or experience, podcasts! If you're seeking a blend of entertainment and education to enhance your cyber security knowledge, we recommend checking out Darknet Diaries!🎙️ Hosted by Jack Rhysider, Darknet Diaries dives into the hidden corners of the internet, uncovering the dark side of cyber security by examining real-life hacks, data breaches, and the individuals responsible for them. With gripping narratives and insightful interviews featuring industry experts, this podcast provides a glimpse into the ever-evolving landscape of digital security. 🔍 Darknet Diaries isn't just about providing thrills; it's also a valuable educational tool for anyone interested in learning the workings of cyber security. Whether you're a seasoned professional or just starting out, each episode offers valuable insights and lessons to enhance your understanding of the industry.💡 Why not transform your commute or workout into a cyber security masterclass? Learning doesn't have to be boring; it can be both informative and enjoyable. By adding podcasts into your routine alongside other activities you enjoy, you can stack positive habits, making the learning experience not only educational but also fun! Check it out linked below! 👇 #cybersecurityeducation #podcasts #infosecurity
Darknet Diaries – True stories from the dark side of the Internet.
darknetdiaries.com
To view or add a comment, sign in
-
Studying cybersecurity has been an eye-opening journey, blending my passion for storytelling with the intricate world of digital protection. With a background in cinema and television production, I've always been captivated by the power of media to shape narratives and influence perspectives. As I delve deeper into the realm of cybercrime, hackers, hacktivism, and the broader cybersecurity landscape, I find myself at the intersection of technology and storytelling. Media like "Darknet Diaries" have been instrumental in this exploration, offering fascinating insights through interviews with intriguing guests and discussions on compelling topics. ... https://lnkd.in/guEBDM7k ... #cybercrime #cybereducation
Darknet Diaries – True stories from the dark side of the Internet.
darknetdiaries.com
To view or add a comment, sign in
-
This "Crowdstrike" Microsoft crash episode of That Tech Pod is important for many professionals to hear! I had flashbacks of the warnings of Y2k. While many professionals fear A.I., the real danger is our delicate cyber and tech infrastructures. Do we need to rebuild? Will global lawsuits solve the problem? What are the alternatives? Do our companies work with the best cybersecurity professionals? Great episode by Laura Milstein, Kevin Albert, Gabriela Schulte! https://lnkd.in/ex8zFzcg #legaltech #cybersecurity #legalops #lawyersoflinkedin #international #globalissues
That Tech Pod: Crowdstrike, AT&T's Breach and the Wiz Acquisition: A Bonus Pod on the Latest Breaking Tech News on Apple Podcasts
podcasts.apple.com
To view or add a comment, sign in
-
Intego Mac Podcast, Episode #339: Patches, Data Breaches, and Too Many Messaging Protocols
Intego Mac Podcast, Episode #339: Patches, Data Breaches, and Too Many Messaging Protocols
http://kirkville.com
To view or add a comment, sign in
-
Long-term lessons from global tech outage In July 2024, what is being called the biggest global tech outage was caused not by a malicious actor but by a cybersecurity company. A mere 40 KB faulty update pushed by CrowdStrike caused millions of devices running Windows operating system to crash. As the dust settles down, it becomes only timely to discuss the long-term lessons from the tech outage. In this episode of All Things Policy, Lokendra Sharma engages in a conversation with Dr Kailash Nadh (CTO of Zerodha) to distill the key lessons. They also discuss Kailash’s ideas on software as a discipline and his thoughts on open source software. YouTube: https://shorturl.at/upSCk Spotify: https://shorturl.at/uB71P Apple Podcasts: https://shorturl.at/TBwfr
To view or add a comment, sign in
-
The past few days have been a significant learning experience for both end-users and vendors. We've gleaned numerous insights, from improving decision-making processes and refining solution evaluation criteria to better managing vendor risks and handling crises. As we move into a new week, it's clear that life continues, shaped by these valuable lessons. SecurityLAH gives you our thoughts on this most talked about subject since Friday... #cybersecurity #securitylah
Crowdstrike just made headlines all over the world. A faulty update caused Windows machine to experience the Blue-Screen-of-Death. What happened, how to resolve it, and most important, answers to questions your senior management or board might ask! Spotify - https://lnkd.in/gs267d2e Apple Podcast - https://bit.ly/SLAH-Apple https://lnkd.in/g_UNcFXg
S04.E1 - Crowdstrike - the global blue screen - SecurityLah - the Asian Cyber Security Show
buzzsprout.com
To view or add a comment, sign in
-
🚨 Important Security Alert: Verizon, AT&T, T-Mobile Affected by Cyber-Attack 🚨 If you're a Verizon, AT&T, or T-Mobile customer, you may be facing threats to the security of your text messages due to the ongoing Salt Typhoon cyber-attack. This breach compromises SMS security, potentially allowing unauthorized access to your messages, which could be read by foreign actors. Today The Daily podcast by The New York Times covered the growing impact of this hack, shedding light on the risks involved. Have a listen and let me know if you or your company needs help. https://lnkd.in/gjgH8Mfr How to Protect Yourself: 🔒 Use Encrypted Messaging Apps To safeguard your sensitive communications, avoid regular text messages. Switch to encrypted messaging platforms like Signal or WhatsApp, which offer stronger security measures. 🔑 Be Cautious with Multi-Factor Authentication (MFA) If you rely on SMS to receive MFA codes, be aware that this method may no longer be secure due to the attack. If possible, switch to a more secure authenticator app (e.g., Google Authenticator, Microsoft Authenticator, Duo, Okta) for reliable and secure verification. If you need help securing your accounts or have questions about this attack, feel free to reach out. Stay safe and stay vigilant!
How China Hacked America’s Phone Network
podcasts.apple.com
To view or add a comment, sign in
Cybersecurity Leader and Strategic IT Innovator | CISSP, CEH, CHFI, Sec+
3moI feel like a chump for not recommending this sooner. It's one of my favorites.