Just in time for spooky season, this episode takes you into the darkest corners of the cyber underworld, where the real monsters aren’t ghosts or goblins, but ransomware gangs lurking in the shadows.
We sat down with Matthew Maynard (3.42), a cybersecurity pro by day and a real-life cyber ghostbuster by night, who doesn’t just hunt vulnerabilities, but haunts the hackers themselves.
While most bug bounty programs reward researchers for finding flaws, Matthew’s work is far more chilling (and thrilling). As part of threat intelligence programs like Halcyon’s Threat Research Intelligence Program (TRIP), he infiltrates ransomware gangs, extracts their secrets and helps shut down their operations before they strike.
For CISOs and executives, Matthew’s experience offers a rare and critical perspective on how to shift from reactive fire-drills to proactive threat hunting. By leveraging dark web intelligence, undercover engagements, and threat actor profiling, security leaders can anticipate attacks, disrupt criminal operations, and even recover stolen data before it’s too late.
All content for Infosecurity Magazine Podcast is the property of Infosecurity Magazine and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Just in time for spooky season, this episode takes you into the darkest corners of the cyber underworld, where the real monsters aren’t ghosts or goblins, but ransomware gangs lurking in the shadows.
We sat down with Matthew Maynard (3.42), a cybersecurity pro by day and a real-life cyber ghostbuster by night, who doesn’t just hunt vulnerabilities, but haunts the hackers themselves.
While most bug bounty programs reward researchers for finding flaws, Matthew’s work is far more chilling (and thrilling). As part of threat intelligence programs like Halcyon’s Threat Research Intelligence Program (TRIP), he infiltrates ransomware gangs, extracts their secrets and helps shut down their operations before they strike.
For CISOs and executives, Matthew’s experience offers a rare and critical perspective on how to shift from reactive fire-drills to proactive threat hunting. By leveraging dark web intelligence, undercover engagements, and threat actor profiling, security leaders can anticipate attacks, disrupt criminal operations, and even recover stolen data before it’s too late.
The Information Heist: Cracking the Code on Infostealers
Infosecurity Magazine Podcast
39 minutes 42 seconds
8 months ago
The Information Heist: Cracking the Code on Infostealers
With 4.3 million devices infected and 3.9 billion stolen passwords shared by hackers, infostealers have emerged as one of the dominant malware threats of 2024.
According to recent reports from Kela and Huntress, these stealthy attackers are now involved in one in four cyber-attacks, making them a major concern for individuals and organizations alike.
In our latest podcast episode, we take a closer look at the rise of infostealers and what you can do to protect yourself from these insidious threats.
You will hear from Leonid Rozenberg, Cybercrime and Threat Intelligence Researcher at Hudosn Rock about:
Infostealers’ ability to steal passwords stored in browsers and other malware features that most people don’t usually talk about (7:24)
The latest trends in infostealer development, deployment and distribution in 2025 (26:40)
How organizations and individuals can prevent and mitigate the infostealer threat (32:07)
Discover more from our sponsor, Vanta, here. https://www.vanta.com/demo-uk?utm_campaign=emea_generic&utm_source=info-security&utm_medium=podcast
Sign up to recieve Infosecurity Magazine's weekly newsletter here.https://www.infosecurity-magazine.com/my-account/login/
Infosecurity Magazine Podcast
Just in time for spooky season, this episode takes you into the darkest corners of the cyber underworld, where the real monsters aren’t ghosts or goblins, but ransomware gangs lurking in the shadows.
We sat down with Matthew Maynard (3.42), a cybersecurity pro by day and a real-life cyber ghostbuster by night, who doesn’t just hunt vulnerabilities, but haunts the hackers themselves.
While most bug bounty programs reward researchers for finding flaws, Matthew’s work is far more chilling (and thrilling). As part of threat intelligence programs like Halcyon’s Threat Research Intelligence Program (TRIP), he infiltrates ransomware gangs, extracts their secrets and helps shut down their operations before they strike.
For CISOs and executives, Matthew’s experience offers a rare and critical perspective on how to shift from reactive fire-drills to proactive threat hunting. By leveraging dark web intelligence, undercover engagements, and threat actor profiling, security leaders can anticipate attacks, disrupt criminal operations, and even recover stolen data before it’s too late.