Hacked

Hacked
undefined
25 snips
Mar 16, 2026 • 1h 12min

Breaking the Chain of Custody

They trace how nation-state cyberweapons like EternalBlue escaped control and enabled mass attacks. They reveal Karuna, a multi-chain iPhone exploit framework made from dozens of zero-days that silently hijacks devices via the web. They cover criminal uses like crypto theft, the exploit resale market, supply-chain AI risks like Kleinjection, and practical defenses such as updating iOS and using Lockdown Mode.
undefined
Mar 2, 2026 • 1h 25min

The $5 Wrench Attack

A primer on the old‑school $5 wrench attack and how physical coercion resurfaces in the crypto era. True crime‑style break‑ins and extortion cases, including alleged Scottsdale and San Francisco incidents. A look at widespread social engineering conspiracies and why cold storage can invite real world risk. Coverage of a DJI robot vacuum privacy flaw and the perks and perils of AI agent tooling.
undefined
8 snips
Feb 16, 2026 • 56min

=Coffee

Kasimir Schulz, lead security researcher at HiddenLayer who studies adversarial attacks on AI, explains Echogram — tokens that flip safety classifiers without changing meaning. He talks about how guardrail classifiers work, how flip tokens are found and transfer across models, real examples like "coffee," risks to agentic systems and admin access, and practical mitigations to harden defenses.
undefined
18 snips
Feb 2, 2026 • 54min

The Protege — "Possibly the Worst Intelligence Disaster in U.S. History"

Eric O'Neill, a former FBI undercover operative who helped unmask Robert Hanssen, shares the tale of infiltrating a mole inside the Bureau. He recounts the fake counterintelligence unit, playing protege to win trust, stealing an encrypted PalmPilot, and the arrest that followed. The conversation probes tradecraft, psychological manipulation, and how insider betrayal shaped modern cyber counterintelligence.
undefined
43 snips
Jan 16, 2026 • 1h 25min

The Charizard Charade

The rise of ultra-rare Pokémon cards has triggered a billion-dollar market, but it also made collecting a target for fraud. The hosts delve into the world of Pokémon prototype forgeries, revealing the fascinating techniques used by a sleuth to expose a forgery ring. They explore the challenges of grading and the vulnerabilities in prototype construction that make authentication difficult. Plus, they discuss the impact of recent technology on both collectibles and fraud detection, with a nod to AI's evolving role in our lives.
undefined
Dec 31, 2025 • 1h 30min

2025 Chatty Chat Year in Review

Join the fun as the hosts recap the highlights from the past year, diving into major topics like the revolutionary Switch 2 and the booming landscape of AI. They speculate about 2026’s proactive AI and share insights on Google's comeback alongside gaming giants like Valve. Plus, they unravel serious issues with ransomware and the economic fallout from high-profile breaches. Finally, there's a light-hearted look at new social media restrictions for teens in Australia. It's a blend of tech trends and personal tales!
undefined
13 snips
Dec 15, 2025 • 1h 11min

Inside the Smishing Triad

Ford Merrill, Senior Director of Research and Innovation at Sec Alliance and security researcher, breaks down Lighthouse and the smishing triad. He describes industrialized phishing kits, wallet provisioning that turns stolen cards into tap-to-pay phones, and the specialized mule and laundering networks that monetize fraud. He also covers takedown challenges, automation at scale, and where these operations find new techniques.
undefined
10 snips
Dec 1, 2025 • 38min

The Gayborhood

In this discussion, Chaya Hanoomanjee, a partner at Austin Hayes and expert in data protection litigation, tackles the serious allegations against Grindr. She reveals how the app, marketed as a safe space for the LGBTQ+ community, is claimed to have shared sensitive user data without proper consent. Chaya breaks down issues of special category data, the intent behind sharing, and the real-life impact on users, including distress and outing risks. She emphasizes the need for accountability and better data practices in the tech industry.
undefined
28 snips
Nov 16, 2025 • 1h 30min

How Much of Facebook’s Revenue Is Scam Ads—And Other Chat Worthy Questions

This engaging talk explores the surprising fact that Meta might earn about $16 billion a year from scam ads. The hosts dive into the recent pardon of Binance founder Changpeng Zhao and the implications of his return. They also discuss the critical role of AWS in the internet economy and what happens when it faces outages. Plus, they tackle the ethical concerns surrounding AI voice licensing and the potential risks of always-on cameras in AR glasses. It's a lively mix of tech, ethics, and market insights!
undefined
Nov 2, 2025 • 50min

BADBOX 2.0

Hh hey maybe don't buy that $14 projector off amazon. In this episode, we dive into the sequel nobody asked for: BADBOX 2.0 — the return of last year’s botnet built out of bargain-bin Android gadgets. Google just filed a lawsuit in federal court alleging that millions of sketchy streaming boxes, projectors, and mystery electronics were shipped pre-infected from factories overseas. The moment someone plugs one in, it joins a global botnet used for ad fraud, click fraud, and even to rent out your home internet connection to criminals. We talk to the team at HUMAN Security, the researchers credited in Google’s suit, about how they traced this thing across 222 countries, why it came back bigger than before, and how you even begin to kill a botnet that ships itself directly to people’s living rooms. Learn more about your ad choices. Visit podcastchoices.com/adchoices

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app