Jack Recider
👤 PersonAppearances Over Time
Podcast Appearances
How special is that? Whatever comes next will surely be exciting. A big thank you to Rachel Toback for coming on the show and sharing these stories with us. She wrote a free ebook on social engineering, and you can find a link to it in the show notes. Besides doing social engineering for companies, she also does security awareness training.
How special is that? Whatever comes next will surely be exciting. A big thank you to Rachel Toback for coming on the show and sharing these stories with us. She wrote a free ebook on social engineering, and you can find a link to it in the show notes. Besides doing social engineering for companies, she also does security awareness training.
And in fact, she started a whole video production company where she creates fun and entertaining training videos. You can learn more about what she's doing by visiting socialproofsecurity.com. Also, thanks to Dan Meisler for giving us some insights into AI. This episode was created by me, the backseat rider, Jack Recider. Our editor is the gourmet sorbet, Tristan Ledger.
And in fact, she started a whole video production company where she creates fun and entertaining training videos. You can learn more about what she's doing by visiting socialproofsecurity.com. Also, thanks to Dan Meisler for giving us some insights into AI. This episode was created by me, the backseat rider, Jack Recider. Our editor is the gourmet sorbet, Tristan Ledger.
Mixing done by Proximity Sound, and our intro music is by the mysterious Brickmaster Cylinder. How does a computer get drunk? It takes screenshots. This is Darknet Diaries.
Mixing done by Proximity Sound, and our intro music is by the mysterious Brickmaster Cylinder. How does a computer get drunk? It takes screenshots. This is Darknet Diaries.
Yeah, a little caffeine hit. Indeed. You know, there's only like a few places in the world that have caffeine. There's tea, coffee, cola, chocolate. And I think that's it. That's the natural sources.
Yeah, a little caffeine hit. Indeed. You know, there's only like a few places in the world that have caffeine. There's tea, coffee, cola, chocolate. And I think that's it. That's the natural sources.
You know what? The thing is that you are the most requested guest maybe I've ever had. Wow.
You know what? The thing is that you are the most requested guest maybe I've ever had. Wow.
So if you're available, I'm available. Let's go. I'm going to put the chocolate to the side and let's make a podcast.
So if you're available, I'm available. Let's go. I'm going to put the chocolate to the side and let's make a podcast.
So you're the guy that everyone knows. You're ready to go. Oh, I'm ready. Yeah, far away. These are true stories from the dark side of the internet. I'm Jack Recider. This is Darknet Diaries. This episode is brought to you by SpyCloud. For some people, ignorance is bliss. But for you, as a security practitioner, that's not the case.
So you're the guy that everyone knows. You're ready to go. Oh, I'm ready. Yeah, far away. These are true stories from the dark side of the internet. I'm Jack Recider. This is Darknet Diaries. This episode is brought to you by SpyCloud. For some people, ignorance is bliss. But for you, as a security practitioner, that's not the case.
I went to spycloud.com to check into my darknet exposure, and I won't tell you what it is, but spoiler alert, I found some things that are pretty eye-opening. From breach exposures to info stealing malware infections, knowing what criminals know about you and your business is the first step to setting things right.
I went to spycloud.com to check into my darknet exposure, and I won't tell you what it is, but spoiler alert, I found some things that are pretty eye-opening. From breach exposures to info stealing malware infections, knowing what criminals know about you and your business is the first step to setting things right.
Resetting stolen passwords and addressing the enterprise access points that have been stolen by malware helps you protect your business from ransomware, account takeovers, and online fraud. With SpyCloud, you have a trusted partner to fight the good fight with.
Resetting stolen passwords and addressing the enterprise access points that have been stolen by malware helps you protect your business from ransomware, account takeovers, and online fraud. With SpyCloud, you have a trusted partner to fight the good fight with.
Their automated solutions, which is built on over 350 billion recaptured assets from the criminal underground, ensure you're not in the dark when it comes to your company's exposure to cybercrime. To get your full Darknet exposure report, visit spycloud.com slash darknetdiaries. That's spycloud.com slash darknetdiaries. This episode is sponsored by Delete Me.
Their automated solutions, which is built on over 350 billion recaptured assets from the criminal underground, ensure you're not in the dark when it comes to your company's exposure to cybercrime. To get your full Darknet exposure report, visit spycloud.com slash darknetdiaries. That's spycloud.com slash darknetdiaries. This episode is sponsored by Delete Me.