Skip to main content

Recent Episode Summaries

14 AI-powered summaries available

69 min episode3 min read

→ WHAT IT COVERS Andrew Batey, co-founder of BeatDapp, explains how early black-hat social media marketing techniques evolved into a $3 billion annual music streaming fraud problem. He details how fraudsters, organized crime, and terrorist organizations exploit streaming platforms using account takeovers, fake artists, and bot networks to manipulate royalty payouts and launder money internationally.

45 min episode3 min read

→ WHAT IT COVERS Phrack Magazine celebrates forty years as the underground hacker publication that shaped cybersecurity. Former editors Skyper and current manager TMZ share stories of domain theft, legal battles, community warfare, and how the volunteer-driven ezine published groundbreaking articles like Smashing the Stack for Fun and Profit while surviving multiple ownership changes and revival attempts.

66 min episode3 min read

→ WHAT IT COVERS Part two of the Masters of Deception story chronicles the legendary hacker war between MOD and Legion of Doom in late 1980s New York, revealing how teenage phone phreakers exploited TimeNet's centralized infrastructure, accessed NSA and White House systems, and ultimately faced federal prosecution under the CFAA, leading to the formation of the Electronic Frontier Foundation.

77 min episode3 min read

→ WHAT IT COVERS The origin story of Legion of Doom, the legendary 1980s hacker group that explored telephone networks and computer systems, leading to the 1986 Computer Fraud and Abuse Act and escalating federal crackdowns on teenage hackers. → KEY INSIGHTS - **Phreaking origins:** Esquire's 1971 blue box article inspired thousands to hack phone systems, including Steve Jobs and Wozniak who sold blue boxes before founding Apple, demonstrating how media coverage catalyzed underground hacking...

49 min episode3 min read

→ WHAT IT COVERS ThreatLocker CEO Danny Jenkins and security professionals share ransomware attack stories, explaining how application whitelisting and zero trust security models prevent malware by blocking all unauthorized software from running by default. → KEY INSIGHTS - **Ransomware Response Protocol:** When hit with Conti ransomware encrypting 250 servers in 15 minutes, immediately shut down all systems, identify entry points, verify backups are clean, and establish red-amber-green device...

61 min episode3 min read

→ WHAT IT COVERS Maxie Reynolds shares her journey from underwater robotics to physical penetration testing, including breaking into secure facilities, accidentally shutting down a city's water supply, stealing transport trucks, and founding an underwater data center company. → KEY INSIGHTS - **Physical Security Failures:** Keys left in truck ignitions, cup holders, under mud flaps, and on visors enabled theft of multiple commercial transport vehicles from a logistics facility with supposedly...

47 min episode3 min read

→ WHAT IT COVERS Tanya Janka shares real-world application security incidents from her career in Canadian government and enterprise, demonstrating how SQL injection vulnerabilities, poor security policies, and inadequate incident response training create exploitable weaknesses in organizational systems. → KEY INSIGHTS - **SQL Injection Detection:** Blind SQL injection attacks ask databases yes/no questions to extract data character-by-character without direct output, making them harder to...

88 min episode3 min read

→ WHAT IT COVERS Nathan Michael ran a massive credit card fraud operation in Oak Cliff, Texas, skimming cards from Chicken Express and gas pumps, coordinating dozens of shoppers, generating millions in fraudulent purchases before serving thirteen years in federal prison. → KEY INSIGHTS - **Skimmer deployment strategy:** Nathan placed Bluetooth-enabled skimmers disguised as legitimate card readers on gas pumps and had accomplices at Chicken Express swipe customer cards through pocket-sized...

82 min episode3 min read

→ WHAT IT COVERS Swedish programmer Ola Bini faces six years of legal persecution in Ecuador after wrongful arrest at airport in 2019, accused of being Russian hacker despite zero evidence, becoming political scapegoat in Julian Assange case. → KEY INSIGHTS - **Privacy as Control:** Privacy means controlling information about yourself, not hiding. Without privacy, surveillance changes voting behavior and undermines democracy.

93 min episode3 min read

→ WHAT IT COVERS Vietnamese hacker Hieu Minh Ngo built a darknet identity marketplace selling 3 million US citizen records from data brokers LocatePlus, Microbilt, and Court Ventures, generating over $3 million before Secret Service arrested him in Guam using an elaborate sting operation. → KEY INSIGHTS - **Data broker exploitation method:** Hieu hacked data brokers using SQL injection and file upload vulnerabilities, then stole customer login credentials to access databases containing 200...

71 min episode3 min read

→ WHAT IT COVERS MG creates the OMG cable, a malicious USB cable indistinguishable from normal cables that enables remote keystroke injection and system access. He discusses manufacturing challenges, real-world penetration testing deployments, and ethical considerations around weaponized hardware availability. → KEY INSIGHTS - **Hardware miniaturization economics:** The NSA Cottonmouth cable cost $20,000 per unit in 2008, but consumer electronics miniaturization enabled MG to replicate similar...

97 min episode3 min read

→ WHAT IT COVERS Greg Glenerys shares his journey from teenage hacker arrested at 14 for creating grade-changing malware to professional penetration tester, including discovering zero-day vulnerabilities in Microsoft Office 2007 and executing elaborate physical security breaches at major tech companies and venture capital firms. → KEY INSIGHTS - **Early vulnerability discovery:** Manual fuzzing involves opening files in hex editors, modifying values outside normal parameters (like changing font...

51 min episode3 min read

→ WHAT IT COVERS The 2020 Vastaamo psychotherapy center breach exposed 33,000 Finnish patients' therapy notes. Hacker Julius Kivimäki extorted victims individually for Bitcoin, demanding €200-500 per person, ultimately receiving only €6,000 total before arrest. → KEY INSIGHTS - **Individual victim extortion:** After failing to extort the company for €400,000, the attacker sent 27,500 personalized ransom emails directly to patients, demanding €200 within 24 hours or €500 after, threatening to...

66 min episode3 min read

→ WHAT IT COVERS Marcus Hutchins, known as MalwareTech, stopped the WannaCry ransomware attack in 2017 by accidentally activating a kill switch, then faced FBI arrest for creating Kronos banking malware years earlier as a teenager. → KEY INSIGHTS - **Kill Switch Discovery:** WannaCry contained an unregistered domain that functioned as a kill switch. Registering the domain immediately stopped the ransomware's spread globally, though Hutchins didn't realize he'd stopped it until hours later when...

Monday morning, inbox, done.

Pick your shows, and start the week knowing what happened in your world.

1

Pick the Podcasts You Care About

Choose from 200+ curated shows or add any public RSS feed.

2

AI Reads Every New Episode

Key arguments, surprising data points, and frameworks worth stealing — pulled automatically.

3

One Email, Every Monday

A curated brief for each episode, with links to listen if something grabs you.

Explore More

Get a free sample digest

See what your Monday email looks like — real AI summaries, no account needed.

One free sample — no spam, no commitment.