Experience the ultimate flexibility with the Isolation API, allowing you to securely Quisque pellentesque id ultrices lacus ornare elit vitae ullamcorper. Learn More

Latest episode

Podcast Landing

E81 | Ransomware Gangs and OSINT

Ransomware groups continue to generate significant profits, frequently relying on recycled or leaked code—leading researchers to describe them as “lazy.” OSINT analysts follow cryptocurrency transactions to trace financial trails, while effective defense depends on early detection, system-level visibility, and staying alert to shifts in attacker techniques.

Listen
Subscribe
Enter your email address below to receive notifications from needlestack@authentic8.com

Featured

executive and his security detail walking

S3E73 | OSINT for executive protection
S3E73 | OSINT for executive protection

Listen
NeedleStack waveform logo with pixelated, padlock outline

S3E68 | Breaking in: how to use OSINT for pen testing
S3E68 | Breaking in: how to use OSINT for pen testing

Listen
hands using phone screen and connecting with its networking features

S2E60 | Social media intelligence gathering with Ritu Gill
S2E60 | Social media intelligence gathering with Ritu Gill

Listen

Latest podcast

Topic
  • Option 1
  • Option 2
  • Option 3
  • Option 4
Podcast Landing

E81 | Ransomware Gangs and OSINT
E81 | Ransomware Gangs and OSINT

Listen
cyber graphic of a magnifying glass

E80 | Using AI in OSINT investigations
E80 | Using AI in OSINT investigations

Listen
cyber lock graphic

E79 | Entering infosec as an outsider!…
E79 | Entering infosec as an outsider! Tips from a librarian turned cyber analyst

Listen
Podcast Landing

E78 | What is counterintelligence?
E78 | What is counterintelligence?

Listen
podcast microphone

E77 | "We’re back, and we’re your…
E77 | "We’re back, and we’re your new hosts."

Listen
pitbull behind fence

S3E76 | Using OSINT to investigate…
S3E76 | Using OSINT to investigate organized animal crime

Listen
Investigating influence operations

S3E75 | Investigating influence…
S3E75 | Investigating influence operations

Listen
an image of the app, telegram

S3E74 | Is Telegram the place for cyber…
S3E74 | Is Telegram the place for cyber investigators?

Listen
executive and his security detail walking

S3E73 | OSINT for executive protection
S3E73 | OSINT for executive protection

Listen
Close
Close