meta_pixel
Tapesearch Logo
Log in
Darknet Diaries

Ep 47: Project Raven

Darknet Diaries

Jack Rhysider

True Crime, Technology

4.98.6K Ratings

🗓️ 17 September 2019

⏱️ 66 minutes

🧾️ Download transcript

Summary

This is the story about an ex-NSA agent who went to work for a secret hacking group in the UAE. Sponsors This episode was sponsored by Thinkst Canary. Their canaries attract malicious actors in your network and then send you an alert if someone tries to access them. Great early warning system for knowing when someone is snooping around where they shouldn’t be. Check them out at https://canary.tools. Support for this episode comes from Blinkist. They offer thousands of condensed non-fiction books, so you can get through books in about 15 minutes. Check out Blinkist.com/DARKNET to start your 7 day free trial and get 25% off when you sign up. Learn more about your ad choices. Visit podcastchoices.com/adchoices

Transcript

Click on a timestamp to play from that location

0:00.0

What's a mercenary? Let me look this up. Okay, there are two main definitions. One is a soldier hired to do work for another army

0:08.4

and the second is a person who works purely because of monetary gains.

0:13.2

I'm gonna guess that they don't have allegiance other than whoever is paying them. They're higher links.

0:18.4

They get paid to do a job and to get it done and they're not supposed to ask why.

0:23.0

Mercenaries are people and people are complex.

0:26.9

They're filled with emotions and they actually do have allegiance even if they're paid to forget about that.

0:33.1

And if you pay a mercenary to do something that goes over their moral line they've got internally, conflict happens.

0:40.7

Everything falls apart.

0:47.0

These are true stories from the dark side of the internet.

0:50.0

I'm Jack Recyder. This is Dark Net Diaries.

0:58.3

Support for this episode comes from Threat Locker. These days one wrong click of a button or opening a corrupted PDF can lead to catastrophic events.

1:22.8

And nobody has time to keep training poor Dave and accounting on what not to click.

1:27.7

Cyberattacks are devastating to businesses and without the correct solutions in place your operations remain at risk.

1:34.0

Threat Locker has built-in endpoint security solutions that strengthen your infrastructure

1:39.2

from the ground up with a zero trust posture. That not only protects business critical data

1:44.6

but also helps mitigate cyberattacks.

1:47.2

Threat Lockers allow listing, ring fencing, storage control, elevation control, and network access control solutions

1:53.3

give you a more secure approach to blocking the exploits of known and unknown application vulnerabilities.

1:59.2

Working together to deny applications by default, block inbound network traffic, and ring fence your applications.

2:05.6

Threat Locker provides zero trust control at the kernel level.

2:09.2

If you're looking for a proactive solution that will keep your business better protected in the face of cyberattacks

2:14.0

check out Threat Lockers Cyber Heroes at www.threatlocker.com

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from Jack Rhysider, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of Jack Rhysider and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.