101: Lotería

In 2014 the Puerto Rico Lottery was mysteriously losing money. Listen to this never before told story about what happened and who did it. Sponsors Support for this show comes from IT Pro TV. Get 65 hours of free training by visiting ITPro.tv/darknet. And use promo code DARKNET. S … | Continue reading


@darknetdiaries.com | 2 years ago

100: NSO

The NSO Group creates a spyware called Pegasus which gives someone access to the data on a mobile phone. They sell this spyware to government agencies around the world. How is it used and what kind of company is the NSO Group? Thanks to John Scott-Railton and Citizen Lab for inve … | Continue reading


@darknetdiaries.com | 2 years ago

99: The Spy

Igor works as a private investigator in NYC. He’s often sitting in cars keeping a distant eye on someone with binoculars. Or following someone through the busy streets of New York. In this episode we hear about a time when Igor was on a case but sensed that something wasn’t right … | Continue reading


@darknetdiaries.com | 2 years ago

98: Zero Day Brokers

Zero day brokers are people who make or sell malware that’s sold to people who will use that malware to exploit people. It’s a strange and mysterious world that not many people know a lot about. Nicole Perlroth, who is a cybersecurity reporter for the NY Times, dove in head first … | Continue reading


@darknetdiaries.com | 2 years ago

97: The Pizza Problem

What if someone wanted to own your Instagram account? Not just control it, but make it totally theirs. This episode tells the story of how someone tried to steal an Instagram account from someone. Sponsors Support for this show comes from Linode. Linode supplies you with virtual … | Continue reading


@darknetdiaries.com | 2 years ago

96: The Police Station Incident

Nicole Beckwith wears a lot of hats. She’s a programmer, incident responder, but also a cop and a task force officer with the Secret Service. In this episode she tells a story which involves all of these roles. https://twitter.com/NicoleBeckwith Sponsors Support for this show com … | Continue reading


@darknetdiaries.com | 2 years ago

95: Jon & Brian's Big Adventure

Jon and Brian are penetration testers who both worked at a place called RedTeam Security. They’re paid to break into buildings and hack into networks to test the security of those buildings. In this episode they bring us a story of how they prepare and execute a mission like this … | Continue reading


@darknetdiaries.com | 2 years ago

94: Mariposa

Chris Davis has been stopping IT security threats for decades. He’s currently running the company Hyas that he started. In this episode he tells a few tales of some threats that he helped stop. Sponsors Support for this show comes from Exabeam. Exabeam lets security teams see wha … | Continue reading


@darknetdiaries.com | 2 years ago

93: Kik

Kik is a wildly popular chat app. Their website says that 1 in 3 American teenagers use Kik. But something dark is brewing on Kik. | Continue reading


@darknetdiaries.com | 2 years ago

Episode 92: The Pirate Bay

The Pirate Bay is a website, a search engine, which has an index of torrent files. A lot of copyrighted material is listed on the site, but the site doesn't store any of the copyrighted material. It just points the user to where you can download it from. So for a while The Pirate … | Continue reading


@darknetdiaries.com | 2 years ago

92: The Pirate Bay

The Pirate Bay is a website, a search engine, which has an index of torrent files. A lot of copyrighted material is listed on the site, but the site doesn't store any of the copyrighted material. It just points the user to where you can download it from. So for a while The Pirate … | Continue reading


@darknetdiaries.com | 2 years ago

91: webjedi

What happens when an unauthorized intruder gets into the network of a major bank? Amélie Koran aka webjedi was there for one of these intrusions and tells us the story of what happened. You can find more talks from Amélie at her website webjedi.net. Sponsors Support for this show … | Continue reading


@darknetdiaries.com | 3 years ago

Master of PWN

The Zero Day Initiative runs a contest called Pwn2Own. The contest calls the best hackers in the world to demonstrate they can hack into software that should be secure. Like browsers, phones, even cars. Whoever can demonstrate the most vulnerabilities will be crowned the Master o … | Continue reading


@darknetdiaries.com | 3 years ago

Darknet Diaries: Meet Jenny Radcliffe, the People Hacker

Meet Jenny Radcliffe, the People Hacker. She's a social engineer and physical penetration tester. Which means she gets paid to break into buildings and test their security. In this episode she tells us a few stories of some penetration testing jobs she's done. | Continue reading


@darknetdiaries.com | 3 years ago

90: Jenny

Meet Jenny Radcliffe, the People Hacker. She’s a social engineer and physical penetration tester. Which means she gets paid to break into buildings and test their security. In this episode she tells us a few stories of some penetration testing jobs she’s done. Sponsors Support fo … | Continue reading


@darknetdiaries.com | 3 years ago

89: Cybereason - Molerats in the Cloud

The threat research team at Cybereason uncovered an interesting piece of malware. Studied it and tracked it. Which lead them to believe they were dealing with a threat actor known as Molerats.  Sponsors This episode is sponsored by Cybereason. Cybereason reverses the attacker’s a … | Continue reading


@darknetdiaries.com | 3 years ago

88: Victor

Victor looks for vulnerabilities on the web and reports them responsibly. This is the story about discloser number 5780. Listen to episodes 86, and 87 before this one to be caught up on the story leading up to this. Sponsors This podcast is sponsored by Navisite. Accelerate IT tr … | Continue reading


@darknetdiaries.com | 3 years ago

87: Guild of the Grumpy Old Hackers

In 2016 the LinkedIn breach data became available to the public. What the Guild of the Grumpy Old Hackers did with it then is quite the story. Listen to Victor, Edwin, and Mattijs tell their story. Sponsors Support for this show comes from Blinkist. They offer thousands of conden … | Continue reading


@darknetdiaries.com | 3 years ago

Podcast about the 2012 LinkedIn data breach – who,how,when

Continue reading


@darknetdiaries.com | 3 years ago

86: The LinkedIn Incident

In 2012, LinkedIn was the target of a data breach. A hacker got in and stole millions of user details. Username and password hashes were then sold to people willing to buy. This episode goes over the story of what happened. For a good password manager, check out LastPass. Sponsor … | Continue reading


@darknetdiaries.com | 3 years ago

Black Duck Eggs – Dark Net Diaries

Continue reading


@darknetdiaries.com | 3 years ago

Security Consultant Breaks into Wrong Bank

Continue reading


@darknetdiaries.com | 3 years ago

85: Cam the Carder

This is the story of Cam Harrison, aka “kilobit” and his rise and fall as a prominent carder. Sponsors Support for this show comes from IT Pro TV. Get 65 hours of free training by visiting ITPro.tv/darknet. And use promo code DARKNET25. Support for this episode comes from Oracle … | Continue reading


@darknetdiaries.com | 3 years ago

84: Jet-setters

How bad is it if you post your boarding pass on Instagram? Our guest, “Alex” decides to figure this out for themself and has quite a story about what happened. You can read more from “Alex” on their blog https://mango.pdf.zone. We also hear from TProphet who’s here to give us som … | Continue reading


@darknetdiaries.com | 3 years ago

83: NSA Cryptologists

In this episode we interview two NSA Cryptologists, Marcus J. Carey and Jeff Man. We hear their story of how they got into the NSA and what they did while there. To hear more stories from Jeff tune into Paul’s Security Weekly where Jeff is a regular co-host and shares a lot of st … | Continue reading


@darknetdiaries.com | 3 years ago

82: Master of Pwn

The Zero Day Initiative runs a hacker contest called Pwn2Own. The contest calls the best hackers in the world to demonstrate they can hack into software that should be secure. Like browsers, phones, and even cars. A lot of vulnerabilities are discovered from this event which mean … | Continue reading


@darknetdiaries.com | 3 years ago

Psyop

Continue reading


@darknetdiaries.com | 3 years ago

81: The Vendor

This is the story of a darknet marketplace vendor we’ll name V. V tells his story of how he first became a buyer, then transitioned into seller. This episode talks about drugs. Listener discretion is advised. If you want to contact V his email is at https://darknetdiaries.com/epi … | Continue reading


@darknetdiaries.com | 3 years ago

80: The Whistleblower

In this episode we hear a story from a social engineer who’s job it is to get people to do things they don’t want to do. Why? For profit. Sponsors Support for this episode comes from SentinelOne which can protect and assistwith ransomeware attacks. On top of that, SentinelOne off … | Continue reading


@darknetdiaries.com | 3 years ago

79: Dark Basin

What do you do when you find yourself the target of a massive hacking campaign, and you are getting thousands of phishing emails and someone following you in your car. You might turn to Citizen Lab who has the ability to research who is behind this and help bring the hackers to j … | Continue reading


@darknetdiaries.com | 3 years ago

Nerdcore – Darknet Diaries

Continue reading


@darknetdiaries.com | 3 years ago

Darknet Diaries Ep 19: Operation Aurora. How Google and others were hacked

Continue reading


@darknetdiaries.com | 3 years ago

78: Nerdcore

Nerdcore music is music for nerds. In this episode we hear from some of the musicians who make Nerdcore music. This episode features guests ytcracker, Ohm-I, and Dual Core. Content warning: This episode has explicit lyrics. Music For a playlist of music used in this episode visit … | Continue reading


@darknetdiaries.com | 3 years ago

77: Olympic Destroyer

In February 2018, during the Winter Olympics in Pyeongchang South Korea, a cyber attack struck, wiping out a lot of the Olympic’s digital infrastructure. Teams rushed to get things back up, but it was bad. Malware had repeatedly wiped the domain controllers rendering a lot of the … | Continue reading


@darknetdiaries.com | 3 years ago

Darknet Diaries Podcast on “Psyop, or Psychological Operations”

Continue reading


@darknetdiaries.com | 3 years ago

Ep.68 Triton (Podcast June 2020)

Continue reading


@darknetdiaries.com | 3 years ago

Hear what goes on internally when MS finds a major vulnerability in Windows

Hear what goes on internally when Microsoft discovers a major vulnerability within Windows. | Continue reading


@darknetdiaries.com | 4 years ago

Operation Glowing Symphony – Darknet Diaries

Operation Inherent Resolve was started in 2016 which aimed to combat ISIS. It was a combined joint task force lead by the US military. Operation Inherent Resolve sent troops, ships, and air strikes to Iraq and Syria to fire weapons upon ISIS military. It's widely known that US mi … | Continue reading


@darknetdiaries.com | 4 years ago

Darknet Diaries – True Stories from the Dark Side of the Internet

Continue reading


@darknetdiaries.com | 4 years ago

Darknet Diaries: Unit 8200 (2018) [audio]

True stories from the dark side of the Internet. | Continue reading


@darknetdiaries.com | 5 years ago

Jeremy from Marketing

True stories from the dark side of the Internet. | Continue reading


@darknetdiaries.com | 5 years ago

Darknet Diaries Podcast

True stories from the dark side of the Internet. | Continue reading


@darknetdiaries.com | 5 years ago

Stuxnet (Podcast)

True stories from the dark side of the Internet. | Continue reading


@darknetdiaries.com | 5 years ago