Experience the ultimate flexibility with the Isolation API, allowing you to securely Quisque pellentesque id ultrices lacus ornare elit vitae ullamcorper. Learn More

Latest episode

Podcast Landing

E81 | Ransomware Gangs and OSINT

Ransomware groups continue to generate significant profits, frequently relying on recycled or leaked code—leading researchers to describe them as “lazy.” OSINT analysts follow cryptocurrency transactions to trace financial trails, while effective defense depends on early detection, system-level visibility, and staying alert to shifts in attacker techniques.

Listen
Subscribe
Enter your email address below to receive notifications from needlestack@authentic8.com

Featured

executive and his security detail walking

S3E73 | OSINT for executive protection
S3E73 | OSINT for executive protection

Listen
NeedleStack waveform logo with pixelated, padlock outline

S3E68 | Breaking in: how to use OSINT for pen testing
S3E68 | Breaking in: how to use OSINT for pen testing

Listen
hands using phone screen and connecting with its networking features

S2E60 | Social media intelligence gathering with Ritu Gill
S2E60 | Social media intelligence gathering with Ritu Gill

Listen

Latest podcast

Topic
  • Option 1
  • Option 2
  • Option 3
  • Option 4
cyber graphic of fingerprint on lock

S2E36 | Is your digital fingerprint…
S2E36 | Is your digital fingerprint following you into 2023?

Listen
image: law enforcement officer looks at documents, a bullet through a lock and wavelengths

S2E35 | The best of season 1
S2E35 | The best of season 1

Listen
Chair next to a bookshelf

S1E34 | Book club: This Is How They…
S1E34 | Book club: This Is How They Tell Me the World Ends

Listen
Person reading a book with a mug in hand

S1E33 | Book club: We Are Bellingcat
S1E33 | Book club: We Are Bellingcat

Listen
Man teaching code

S1E32 | Practical OSINT tips from the…
S1E32 | Practical OSINT tips from the field

Listen
Podcast Landing

S1E31 | Subverting censorship through…
S1E31 | Subverting censorship through tech

Listen
fact-checking techniques

S1E30 | How to perform a fact-check:…
S1E30 | How to perform a fact-check: from start to finish

Listen
Person using cell phone with disinformation being thrown at them

S1E29 | Verifying what you see in the…
S1E29 | Verifying what you see in the media

Listen
NeedleStack S1E28

S1E28 | Why Russian disinformation is…
S1E28 | Why Russian disinformation is so effective

Listen
Close
Close