MoD
1/20/20261 hr 7 min
Legion of Doom, step aside. There’s a new elite hacker group in town, and they’re calling themselves Masters of Deception (MoD). With tactics that are grittier and more sophisticated than those of the LoD, MoD has targeted high-profile entities and left an indelible mark on the internet.
This is part 2 of the LoD/MoD series.
Sponsors
Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking...
Clips
Transcript preview
First 90 secondsJack Rhysider· Host0:00
...This story picks up from where we left off in part one, so if you haven't heard it yet, you need to go back one episode and listen to that one before listening to this, because this is part two. [music] These are true stories from the dark side of the internet. I'm Jack Rhysider. This is Darknet Diaries. [music] This episode is sponsored by ThreatLocker. Ransomware, supply chain attacks, and zero-day exploits can strike without warning, leaving your business's sensitive data and digital assets vulnerable. But imagine a world where your cybersecurity strategy could prevent these threats, and that's the power of ThreatLocker zero trust endpoint protection platform. Robust cybersecurity is a non-negotiable to safeguard organizations from cyberattacks. ThreatLocker implements a proactive deny-by-default approach to cybersecurity, blocking every action, process, and user unless specifically authorized by your team. This least-privileged strategy mitigates the exploitation of trusted applications and ensures 24/7, 365 protection for your organization. The core of ThreatLocker is its Protect suite, including application allowlisting, ringfencing, and network control. Additional tools, like the ThreatLocker Detect