Get every episode of Darknet Diaries analyzed

We'll email you the full breakdown the moment new episodes drop.

Already have an account? Sign in

Darknet Diaries

Podcasts · Technology

Darknet Diaries

91 episodes · 20 with AI analysis

AI Intelligence · across all analyzed episodes

Topics · top 10

SQL Injection Vulnerabilities×2Meme Coin Trading and Pump.fun PlatformCryptocurrency Exchange Security VulnerabilitiesFlash Loan Attacks and DeFi ExploitsInsider Threats in Cryptocurrency CompaniesKYC/AML Compliance Gaps in Crypto PlatformsContent Moderation at Scale on Decentralized PlatformsChild Exploitation and Livestream MonetizationMental Health and Cybercrime MotivationSolana Network Outages and Resilience

Analyzed Episodes

Dec 3, 2024

152: Stacc Attack

Meme Coin Trading and Pump.fun PlatformCryptocurrency Exchange Security VulnerabilitiesFlash Loan Attacks and DeFi Exploits
View Analysis

Jan 7, 2025

153: Bike Index

Bike theft and stolen goods recoveryOrganized retail crime and supply chain theftCross-border criminal networks and logistics
View Analysis

Feb 4, 2025

154: Hijacked Line

SIM Swapping AttacksCryptocurrency Theft and SecuritySocial Engineering Techniques
View Analysis

Mar 4, 2025

155: Kingpin

Hardware hacking and fault injection techniquesCryptocurrency wallet security and recoveryElectronic badge design and DEF CON culture
View Analysis

Mar 18, 2025

156: Kill List

Dark Web Security VulnerabilitiesInsecure Direct Object References (OWASP Top 10)URL Parameter Tampering Exploitation
View Analysis

Apr 1, 2025

157: Grifter

DefCon conference culture and organizationBlack Hat network operations center (NOC) infrastructureThreat hunting methodologies and frameworks
View Analysis

May 6, 2025

158: MalwareTech

WannaCry ransomware attack and kill-switch mechanismMalware reverse engineering and botnet C2 infrastructure analysisBanking malware development (Kronos malware)
View Analysis

Jun 3, 2025

159: Vastaamo

Psychotherapy Data Breach ImpactRansomware Extortion at ScaleOperational Security Failures in Cybercrime
View Analysis

Jul 1, 2025

160: Greg

Zero-day vulnerability discovery and responsible disclosureMicrosoft Office macro viruses and exploitation techniquesFuzzing and file format manipulation for vulnerability research
View Analysis

Jul 15, 2025

161: mg

Malicious USB Cable Design and ManufacturingHardware-Based Keystroke Injection AttacksAir-Gapped System Compromise via Physical Access
View Analysis

Aug 5, 2025

162: Hieu

Data Broker Regulation and OversightComputer Fraud and Abuse Act (CFAA) EnforcementIdentity Theft and Tax Refund Fraud
View Analysis

Sep 2, 2025

163: Ola

Political persecution and scapegoating through criminal prosecutionPrivacy advocacy and encryption tool development as government targetsExtrajudicial detention and violation of due process rights
View Analysis

Oct 7, 2025

164: Oak Cliff Swipers

Credit Card Fraud and Skimming OperationsMagnetic Stripe Reader (MSR) Technology AbusePoint-of-Sale (POS) System Vulnerabilities
View Analysis

Nov 4, 2025

165: Tanya

SQL Injection VulnerabilitiesBlind SQL Injection AttacksApplication Security (AppSec) Programs
View Analysis

Dec 2, 2025

166: Maxie

Physical Penetration TestingSocial Engineering and PretextingAttacker Mindset Development
View Analysis

Mar 3, 2026

171: Melody Fraud

Music Streaming Fraud DetectionAccount Takeover AttacksMoney Laundering Through Streaming Platforms
View Analysis

Dec 23, 2025

167: Threatlocker

Ransomware Attack Recovery ProceduresZero-Trust Security ArchitectureApplication Whitelisting and Deny-by-Default Policies
View Analysis

Jan 6, 2026

168: LoD

Computer Fraud and Abuse Act (CFAA) - 1986 legislation and its broad interpretationPhone Freaking and Blue Box Technology - 1970s-1980s telecommunications hackingLegion of Doom (LOD) - Hacker group structure, ethics, and operations
View Analysis

Feb 3, 2026

170: Phrack

Phrack Magazine History and EvolutionBuffer Overflow Exploitation TechniquesPhone Freaking and Telecommunications Hacking
View Analysis

Jan 20, 2026

169: MoD

Computer Fraud and Abuse Act (CFAA)Telecommunications network securityHacker group rivalries and culture
View Analysis