AI Intelligence · across all analyzed episodes
People · top 20
Companies · top 20
Topics · top 10
SQL Injection Vulnerabilities×2Meme Coin Trading and Pump.fun PlatformCryptocurrency Exchange Security VulnerabilitiesFlash Loan Attacks and DeFi ExploitsInsider Threats in Cryptocurrency CompaniesKYC/AML Compliance Gaps in Crypto PlatformsContent Moderation at Scale on Decentralized PlatformsChild Exploitation and Livestream MonetizationMental Health and Cybercrime MotivationSolana Network Outages and Resilience
Analyzed Episodes
Dec 3, 2024
152: Stacc Attack
Meme Coin Trading and Pump.fun PlatformCryptocurrency Exchange Security VulnerabilitiesFlash Loan Attacks and DeFi Exploits
View AnalysisJan 7, 2025
153: Bike Index
Bike theft and stolen goods recoveryOrganized retail crime and supply chain theftCross-border criminal networks and logistics
View AnalysisFeb 4, 2025
154: Hijacked Line
SIM Swapping AttacksCryptocurrency Theft and SecuritySocial Engineering Techniques
View AnalysisMar 4, 2025
155: Kingpin
Hardware hacking and fault injection techniquesCryptocurrency wallet security and recoveryElectronic badge design and DEF CON culture
View AnalysisMar 18, 2025
156: Kill List
Dark Web Security VulnerabilitiesInsecure Direct Object References (OWASP Top 10)URL Parameter Tampering Exploitation
View AnalysisApr 1, 2025
157: Grifter
DefCon conference culture and organizationBlack Hat network operations center (NOC) infrastructureThreat hunting methodologies and frameworks
View AnalysisMay 6, 2025
158: MalwareTech
WannaCry ransomware attack and kill-switch mechanismMalware reverse engineering and botnet C2 infrastructure analysisBanking malware development (Kronos malware)
View AnalysisJun 3, 2025
159: Vastaamo
Psychotherapy Data Breach ImpactRansomware Extortion at ScaleOperational Security Failures in Cybercrime
View AnalysisJul 1, 2025
160: Greg
Zero-day vulnerability discovery and responsible disclosureMicrosoft Office macro viruses and exploitation techniquesFuzzing and file format manipulation for vulnerability research
View AnalysisJul 15, 2025
161: mg
Malicious USB Cable Design and ManufacturingHardware-Based Keystroke Injection AttacksAir-Gapped System Compromise via Physical Access
View AnalysisAug 5, 2025
162: Hieu
Data Broker Regulation and OversightComputer Fraud and Abuse Act (CFAA) EnforcementIdentity Theft and Tax Refund Fraud
View AnalysisSep 2, 2025
163: Ola
Political persecution and scapegoating through criminal prosecutionPrivacy advocacy and encryption tool development as government targetsExtrajudicial detention and violation of due process rights
View AnalysisOct 7, 2025
164: Oak Cliff Swipers
Credit Card Fraud and Skimming OperationsMagnetic Stripe Reader (MSR) Technology AbusePoint-of-Sale (POS) System Vulnerabilities
View AnalysisNov 4, 2025
165: Tanya
SQL Injection VulnerabilitiesBlind SQL Injection AttacksApplication Security (AppSec) Programs
View AnalysisDec 2, 2025
166: Maxie
Physical Penetration TestingSocial Engineering and PretextingAttacker Mindset Development
View AnalysisMar 3, 2026
171: Melody Fraud
Music Streaming Fraud DetectionAccount Takeover AttacksMoney Laundering Through Streaming Platforms
View AnalysisDec 23, 2025
167: Threatlocker
Ransomware Attack Recovery ProceduresZero-Trust Security ArchitectureApplication Whitelisting and Deny-by-Default Policies
View AnalysisJan 6, 2026
168: LoD
Computer Fraud and Abuse Act (CFAA) - 1986 legislation and its broad interpretationPhone Freaking and Blue Box Technology - 1970s-1980s telecommunications hackingLegion of Doom (LOD) - Hacker group structure, ethics, and operations
View AnalysisFeb 3, 2026
170: Phrack
Phrack Magazine History and EvolutionBuffer Overflow Exploitation TechniquesPhone Freaking and Telecommunications Hacking
View AnalysisJan 20, 2026
169: MoD
Computer Fraud and Abuse Act (CFAA)Telecommunications network securityHacker group rivalries and culture
View Analysis