Discover
The Dark Web Diaries

The Dark Web Diaries
Author: Joe Eagles
Subscribed: 11Played: 48Subscribe
Share
© Joe Eagles
Description
When someone says Cybersecurity, what actually comes to mind?
For many, the term can be quite overwhelming. However, this podcast promises to teach you the most important aspects of cybersecurity, from basic online safety to hacker's and their motivations.
The Dark Web Diaries will pull back the curtain on the most fascinating cybersecurity topics, whilst also covering weekly updates in the world of cyber news.
Are you ready to become a cybersecurity expert?
New Episodes every Saturday!
*Please note: Audio issues in Episodes 1&2*
For many, the term can be quite overwhelming. However, this podcast promises to teach you the most important aspects of cybersecurity, from basic online safety to hacker's and their motivations.
The Dark Web Diaries will pull back the curtain on the most fascinating cybersecurity topics, whilst also covering weekly updates in the world of cyber news.
Are you ready to become a cybersecurity expert?
New Episodes every Saturday!
*Please note: Audio issues in Episodes 1&2*
15 Episodes
Reverse
When you send a WhatsApp message, it doesn’t just fly across the internet. It takes a journey through invisible layers - like levels of a secret underground city - each with its own job, rules, and risks. Hackers know these layers well. After today, you will too.
In today's episode we dive into the current state of Apple in the Technology Market, looking at sales statistics and innovation with new iPhone models. Pivoting slightly from our usual cybersecurity topics, this is the first episode to do so and explores an interesting discussion about Apple's position in the tech market.
What do Marks & Spencer, The Co Op, and Harrods all have in common? You guessed it, they’ve all been targeted by cyber attacks in 2025 (by the same threat actors). And the scary part isn’t that the hackers got in. It’s how easily they managed to do it.
What happens now that your eyes can no longer be trusted? Deepfakes are turning fiction into fact, and it is becoming increasingly difficult to discern AI-generated content from real content - and no one is safe from the fallout.
Wars don’t always start with bombs anymore. Sometimes, they start with a blackout. No internet. No banks. No warning. This is the new face of war - where the battlefield is digital, and the targets are all of us.Check out The Hacker News and Krebs On Security for more information on the news stories.
Every time you load a webpage, a silent network of servers, routers, and protocols springs into action. But what if I told you that hackers can hijack this invisible infrastructure - and you would never even know? Welcome to the side of the internet you were never meant to see.
Kids are taught things like Algebra and the Mitochondria being the powerhouse of the cell in school, but not the basics of cybersecurity like how to spot a phishing email. In a world that now lives online, why are we still treating cybersecurity like it’s optional
Imagine a world where cybercriminals don’t need to write a single line of code to launch a devastating ransomware attack - just a payment card and a dark web subscription. Welcome to Ransomware as a Service (RaaS), where crime is packaged like a product, complete with customer support, user dashboards, and pricing tiers. It’s organised, it’s profitable, and it’s changing the way the digital underworld operates. Today, we’re pulling back the curtain on the business of hacking - for hire
You posted a gym selfie. No big deal, right? But that background - your location. That social media handle - your name. That caption - your routine. To you, it’s fun and lighthearted. But, to a hacker, it’s a roadmap.
You think you’d never fall for a scam, right? Well, so did the CEOs, doctors, and tech pros who lost thousands from scams. Turns out—it’s not about intelligence. It’s about your brain
Cyberattacks used to live in code. Now they’re crashing hospitals, unlocking doors, and spying from your pocket. Let’s talk about how digital threats are colliding with real life.Also in this episode we take a Quick Look at how Trump's tariffs have affected publicly traded Cybersecurity companies over the past week (Not investment advice).
If you’re not paying for the product…you are the product. Let’s talk about what that really means in 2025, and break down privacy in the digital age.
AI is changing the game in cybersecurity—but not just for the good guys. Hackers are using AI to craft perfect scams, break into systems faster than ever, and even create self-evolving malware. So, can we fight AI with AI? Or are we losing the cyber war? Let’s find out
*Audio issue at the beginning of this episode* - audio starts around 18 seconds. From Hollywood blockbusters to TV dramas and video games, hacking is often depicted as something flashy and almost magical. You might be used to a guy typing away at a keyboard with lines upon lines of green text appearing on the computer screen. But how much of it is real? Let’s dive into how pop culture portrays hackers and cybersecurity, separating fact from fiction.
*Please be aware there are some audio issues in this episode. These have been corrected in future episodes*. In this episode, we tackle one of the most common cybersecurity topics: phishing.Everyone has heard of phishing, but what are the steps actually involved in a high-level phishing attack?