• Episode 2026-04-20
    Apr 20 2026
    This episode digs into the surprisingly organized underground economy of stolen credit cards, where fraudsters use customer service metrics and escrow systems to avoid getting scammed themselves. We also explore the EU's rushed age-verification app that researchers dismantled in minutes, and why your push notifications might be leaking more metadata than you think.
    Mehr anzeigen Weniger anzeigen
    7 Min.
  • Episode 2026-04-18
    Apr 18 2026
    This episode covers a massive North Korean laptop-farm scheme that fooled U.S. companies for years, Bluesky's battle with a brutal DDoS attack that's testing its credibility, and a teen hacker's rare public confession just before heading to prison. Adrian North breaks down how each story reveals something bigger about the vulnerabilities baked into our digital systems.
    Mehr anzeigen Weniger anzeigen
    8 Min.
  • Episode 2026-04-09
    Apr 17 2026

    This episode digs into the growing gap between cyber threats and our defenses — from the FBI's report on a record $21 billion lost to scams, to AI models now finding zero-day vulnerabilities in hours instead of months. We also look at how modern GPUs can crack complex passwords in under a day, and why credential theft remains the fastest path to a breach.

    Mehr anzeigen Weniger anzeigen
    8 Min.
  • Episode 2026-04-07
    Apr 8 2026
    This episode digs into NASA's Artemis II Moon mission — historic but more infrastructure test than breakthrough — then pivots to a brutal week in cybersecurity. From Anthropic's code leak and the FBI getting breached to North Korean crypto heists and supply chain attacks collapsing response times, Adrian unpacks how AI tools have turned developer machines into open credential vaults for attackers.
    Mehr anzeigen Weniger anzeigen
    5 Min.
  • Episode 2026-04-06
    Apr 6 2026
    This episode digs into LinkedIn's hidden surveillance of over 6,000 Chrome extensions, the failure of app store privacy labels to actually protect users, and Microsoft's hilarious legal disclaimer that Copilot is "for entertainment purposes only" despite selling it as a serious business tool. We're looking at the gap between what tech companies say they're doing and what's really happening behind the scenes. It's your morning Signal Check — coffee's hot, and the tech world's already showing its hand.
    Mehr anzeigen Weniger anzeigen
    7 Min.
  • Episode 2026-04-04
    Apr 4 2026
    This episode digs into a lightning-fast npm supply chain attack that shows how AI is collapsing human response time, explores a skull-vibration authentication system built into XR headsets that could verify you're still you without lifting a finger, and covers the North Carolina IT admin who methodically locked thousands of company devices with a password straight out of a cybercrime playbook. From accelerating threats to passive biometrics to insider extortion, it's a snapshot of security in motion.
    Mehr anzeigen Weniger anzeigen
    6 Min.
  • Episode 2026-04-01
    Apr 1 2026
    This episode digs into a man who lost everything to an AI chatbot he believed was becoming sentient, a shocking leak of Claude's source code through a simple packaging error, and one of the most sophisticated supply chain attacks ever—targeting Axios with tradecraft that points straight to North Korea. Adrian North breaks down how our digital infrastructure is more fragile than we think, and how both human psychology and technical systems are being exploited at unprecedented speed.
    Mehr anzeigen Weniger anzeigen
    6 Min.
  • Episode 2026-03-29
    Mar 29 2026

    This episode covers Google's 2029 deadline for quantum-safe encryption, the military weaponization of hacked security cameras by state actors, and the compromising of FBI Director Kash Patel's personal email by a suspected Iranian cyber unit. Adrian North walks through why these aren't isolated incidents—they're signals of a rapidly shifting threat landscape where legacy systems, unpatched IoT devices, and personal security gaps are becoming critical vulnerabilities.

    Mehr anzeigen Weniger anzeigen
    7 Min.