
In this episode, Graham unravels Operation Endgame – the surprisingly stylish police crackdown that is seizing botnets, mocking malware authors with anime videos, and taunting cybercriminals via Telegram.
Meanwhile, Carole exposes the AI-generated remote hiring threat. Could your next coworker be a North Korean hacker with a perfect LinkedIn?
And BBC cyber correspondent Joe Tidy joins us to talk about “Ctrl-Alt-Chaos”, his new book diving into the murky world of teenage hackers, ransomware gangs, and the strange motivations that lie behind digital mayhem.
Plus: competitive pond husbandry, dead slugs, Hitster the board game, and a shoutout to the AI startup that hijacked Graham’s SEO.
All this and more is discussed in episode 423 of the “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault – it’s like a cauldron of life… but for cybersecurity.
Warning: This podcast may contain nuts, adult themes, and rude language.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
My name's Graham Cluley.
Please put your hands together for BBC cyber correspondent and author, ooh la la, Joe Tidy. Hello, Joe.
I just basically quit watching TV.
But yeah, a lot of work.
There's been enough people now that are being nice about it to make me think that actually maybe it is a good book, you know, because the first few people you think they're just being nice, but actually no, it's been pretty good.
I got some nice reviews in the press and some people have commented on it and it's been a really amazing thing.
It's the hardest thing I've ever done, but I've done documentaries and I've done podcasts and all the rest of it. But writing a book has been, you know, massive.
I liken it to kind of an Ironman.
I've done an Ironman before and it's a bit like that in terms of an endurance race or the sacrifices and discipline, but it's the most rewarding thing I've ever done already in terms of just what I learned and what I'm hearing.
And yeah, I'm really, really enjoying it.
So coming up on today's show, Graham, what do you got?
Cybercriminals, they've been swanning around in their Telegram channels. They've been selling access to corporate networks. They've been launching attacks left, right, and center.
They've been doing donuts in their Lamborghinis around Red Square. And they have been laughing all the way to the bank, or maybe more specifically, their cryptocurrency wallet.
Meanwhile, however, the cops, law enforcement, they've been telling people to watch out for phishing emails or asking their Russian counterparts, very nicely, one assumes, if they wouldn't mind having a word in the ear of some of those who are responsible for these attacks.
There's a good lad. Maybe just give them a nudge. It's been they've been asking nicely for suspects to come in for questioning. And you've thought, isn't this a losing battle?
Well, I'd postulate that maybe it isn't. Maybe it looks something may have actually changed, and it's not all going the way of the bad guys any longer.
Because I know over the last few months, there have been lots of headlines about the likes of Marks & Spencer and Co-op and British Library and insurance companies in the States and Victoria's Secret being hacked, all that sort of stuff.
But maybe it's not all bad news on the cybercrime front because there has been something going on.
There is a police operation called Operation Endgame, which has stormed onto the scene and it's not mucking about.
And they've been basically taking the mick out of all these people that they have uncovered and unmasked as being behind these big ransomware crews.
It seems now if you want to be a cybercrime cop, you also need skills to create AI videos with Russian subtitles aimed at the criminal underground.
Some of these videos are mocking the malware authors for infecting their own computers with malware.
Others are telling them to go straight and turn a new leaf, saying it's never too late to change.
They actually, if you go to the Operation Endgame website, and this is a police operation, as I'm about to explain, they're releasing seasons of these videos.
You can binge-watch them as if you were sat in front of Netflix.
So Operation Endgame, it sounds a Marvel superhero movie, but despite the cheesy name, it has been succeeding in disrupting and smashing up parts of the criminal underworld.
And I thought it was worth just talking about some of the ways in which they've been doing that.
At the end of May, for instance, Dutch police working with the FBI, they announced that they had taken down—
I don't know what it is, but they are involved in every single major international operation.
Anyway, for over a decade, this website, AVCheck, offered this really convenient service.
What you could do is you could upload a suspicious file you found on your computer, and it will tell you which antivirus products detected it and what they detected it as.
A bit VirusTotal, which you may have heard of.
It reminds me of the DDoS-for-hire services where you can go on and they say, oh, well, this could be for internal testing for your own web service or whatever.
And you think, yeah, okay. But that one, there's no disclaimer possible, is there? There's only one reason why I'd use that.
Makes you wonder how many attacks slipped through because of it. But Operation Endgame brought it to a halt. They took down the site and Operation Endgame didn't stop there.
Earlier in May, they also went after initial access malware.
Those are the tools that cybercriminals use to sneak into systems before deploying ransomware, we're talking about malware with crazy names like QuackBot and TrickBot and Danabot.
Danabot has infected over 300,000 computers around the world. It's caused an estimated $50 million worth of damage.
And there've been variants of it actually, which are specifically, it appears, designed to conduct espionage for the Russian state. So Danabot.
If they're not succeeding in collaring some of these cybercriminals, they might as well have some fun taking the mick out of them.
Because obviously anonymity is part of their power.
And sometimes that makes a difference and sometimes it doesn't.
On the same day as they took down Danabot, they also took down LumaStealer. There were over 2,300 domains that were hosting LumaStealer control panels and payloads.
LumaStealer was a piece of malware that infected your computer and would extract usernames and passwords from various apps and send them to servers controlled by the attackers.
The cops, when they took over LumaStealer, they not only put up their sort of standard This website has been taken down banner and began collecting traffic about infected victims.
They also posted a message to LumaStealer's Telegram channel, again, mocking them for what they had done.
So if you can rip the carpet from underneath them, or rug pull, as they say, make them look silly, they're far less likely to get anyone following them and using their services.
Is something already being compromised?
It's because it's got this simple, point-and-click interface. It means even the thickest cybercriminal could handle it, make money out of what they stole.
They could even very easily— there was an option to sell all of the data which you had stolen with this tool on a private marketplace, which was operated by the creators of LumaStealer.
So they really made it easy. It was like the Etsy of cybercrime.
So in just one month, Operation Endgame, which has been running for a while, and had various victories, but they've managed to go after the major tools that help cybercriminals steal credentials and passwords, the tools which help them test their malware to see if it's detected or not and to gain access to networks.
This has been a real strategic hit, I think, to ransomware infrastructure.
And that, I think, combined with these crazy anime videos with Russian subtitles aimed at the criminal underground. It's doing a pretty good job.
So it doesn't always have an impact, because sometimes of course these people will rebrand their services and pop back up and use a different alias.
I think there's definitely something to be said for unmasking and embarrassing these individuals who are just men, normally always men, who have got egos and they want to be seen to be all powerful.
So, yeah. That will have an impact. But if Danabot's down, will there be a Jannabot that pops up in a few weeks' time?
That's the frustration, I think, with these law enforcement operations is how long-lasting they are.
But of course, you always have to think, is it actually them that are back, or is it the cops masquerading as them? So hopefully that uncertainty will make things better.
If you go to the Operation Endgame website right now, you can not only see these videos, you can also see the mugshots of the suspects, some of Europe's most wanted, including some anime drawings of suspects when I guess they didn't have photographs.
And that's what I quite liked about a similar one from— it was led by the NCA in the UK.
Smashing Security against LockBit, because they took over the LockBit name and shame website, the leak site.
And instead of having the victim companies, you know, normally you have this kind of graveyard-style darknet site where you scroll down, you see all the companies that have been popped by LockBit.
Instead of that, they had the names of the people who are part of LockBit and statistics on how many people have been arrested and threats of more action to come.
They were the boxes. I really remember that as being quite a strong message being sent.
So these cartoonish videos, these catchy jingles, all very entertaining. But you're right, they're no real substitute for actual arrests.
So I'm shamelessly using my little slot that you've given me to plug my book.
I'm a first-time author, and all the support and help that the community can give me would be wonderful to prove that cyberbooks can be a success.
So the book is about, as the subtitle suggests, this trend of teenage cybercriminals on the internet.
We have heard over the years so many stories of teenagers finding their way into systems and networks and causing havoc and mayhem and chaos to not only businesses but people's lives.
And the thesis of the book is that this is an element of the cybercrime ecosystem that we always underestimate.
We don't like to admit that we've been popped by teenagers, hackers in hoodies in bedrooms.
We like to think, oh no, it's definitely the Russians or the Chinese or the North Koreans.
But actually, quite often, it is indeed little Johnny upstairs when he's not playing Minecraft or Roblox. He's causing problems online.
And the thrust of the book, the thread that runs through, is this criminal called Julius Kivimäki, who was a teenage cybercriminal who I interviewed at Sky News when I used to work there, when I was a general reporter.
And it was in 2014 at Christmas time.
And I don't know if you guys remember this, but he was part of a gang called Lizard Squad, which took down the PlayStation Network and Xbox Live and caused— it was a big DDoS attack, which hit both companies simultaneously.
And it meant that about 150 million people couldn't play on their new games or register new consoles.
And so it follows my journey into cybersecurity and doing that interview with this 17-year-old who didn't give a damn about what him and his delinquent gang were causing, the problems they were causing.
He's Finnish, which we put on Sky News around the time. And he was like, yeah, we did it for fun. We did it to prove that we're more powerful than the companies.
On the internet, you're obviously bragging about it, but this is a serious thing. There are victims to this, aren't there?
And from that day, I just became obsessed with cybersecurity.
And I've sort of tried to follow this individual who went missing for a few years after many other cybercrimes and then popped up back in 2022 when he was accused of what is, I would argue, the cruelest cyberattack in history against a chain of psychotherapy centres in Finland called Vastamo.
He hacked in and stole the patient notes of about 33,000 people. And for my money, I can't think of anything worse than having my therapy notes stolen.
You know, we talk about data breaches all the time, don't we? But your name, address, telephone number, email address, or whatever, Social Security.
So then the kind of final Hail Mary, which is arguably why I put it in that cruelest cyberattack ever, is because, as you say, he then emailed about 27,000 people who he could find email addresses for, saying, "I have your notes." Oh, I thought you'd been saying "coolest."
But this type of breach, this type of vulnerable data, bear in mind, these people are already quite often vulnerable themselves already.
So anyway, Julius Kivimäki went from teenage delinquent all the way through to most wanted cybercriminal in Europe and is now currently in prison.
So my book is all about him and his journey and the teenage hacking gangs of the 2010s and how we went from kind of the 1990s and when it was the Hacker Manifesto and do no evil and we were just misunderstood and we're here to make the internet safer through to Anonymous and then these teenage gangs of the 2010s where Kivimäki rose up and then where we are now today with Scattered Spider and Lapsus$ and really serious cybercrime being carried out by teenagers.
Have you seen some common explanation as to what's going on?
So, you know, 10 years ago they put this what they call a pathway to cybercrime. They did a survey and they put this out and said, this is by far and away the most likely scenario.
So you're a young teenage boy and it is normally always boys. You play games, then you want to beat your friends. So you go on the internet and you find ways to cheat in games.
Then you find ways to get more, basically hack the game in a sense and get more kind of powers or whatever. Then you find yourself on cheating forums and hacking forums.
Then you find yourself carrying out more traditional hacking. For fun and out of curiosity. Then there's money sometimes that becomes involved, and then serious cybercrime follows.
And I think in my book, what I talk about is why? Why does this happen?
And why, why particularly do we see this shift from the sort of do no harm hacking to what we see today with teenage cybercrime, how it went dark essentially?
And I think the things that I landed on are, first of all, the rise of Twitter. I'd say that that had a big impact because before that, social networks were about being social.
People in your network, whereas Twitter was about followers and likes and retweets.
So it was about becoming famous and more particularly, more specifically becoming infamous on the internet.
So that's how you got these massive gangs rising up and they had logos and they had spokespeople and hacking was sort of brought out of the shadows and made to look cool and fun.
And then Bitcoin as well. Bitcoin meant that suddenly you've got really easily transferable money, which you can hide behind as well.
And I think they're the reasons why, you know, we've seen some of this teenage cybercrime culture or teenage hacking culture move towards cybercrime.
But also, you don't really know as well. There's an educational part of it. At the end of the book, I try and work out, you know, why, how could we stop this?
But yeah, I think when you're a teenager, your ethics are kind of mixed up and you feel like nothing's going to stop you. Plus, the law does protect under-18s as well.
And their attitude was, well, they're not going to put me in jail, are they?
But in the hacking world, in the cybercrime world, you speak to some— I have spoken to some female hackers.
And the problem is that because of this kind of edgelord behavior, misogyny is part of that. Look how outrageous I can be.
And it means that you don't make the connections as a young cybercriminal that perhaps boys are able to, which means you can't build that network of varying skills.
There are loads of female cybercriminals. But at the same time, yes, I suppose it's a wider problem in sort of online communities, you know, that are dominated by young boys.
They do tend to and often become hostile to young women.
And also, you know, if you say it starts with the gaming, a lot of games, most games, especially if you're talking 10 years ago when they might have There's a lot more male-focused games or boy-focused games, I think.
And I don't know if Roblox has made it or somewhat a creator on the platform made it.
So Grow Your Garden is just you have a really rubbish-looking blocky garden, Roblox style, and you just plant stuff, and then you watch it grow. Literally, that is it.
But it's absolutely monstrous. I think they said something it's broken the record for having 16 million concurrent players.
Before that, it was Fortnite, and now this ridiculous grow-a-garden game.
I was picking up my son yesterday from football, and I thought it was so funny and also quite wholesome because all the kids that were waiting to run onto the pitch, boys and girls, were all discussing grow a garden.
And I was listening and they were going, oh yeah, I grew a courgette today. Oh yeah, you should see my cauliflowers. And then, and I was, what is going on?
And then they all ran on the football pitch and they started playing football in the sunshine. I thought, that's childhood, you know, you can have it all.
You can have the computer games and the online life and you can have the offline life and you can be a fully rounded individual.
You don't have to go from gaming to cybercrime, which is where my brain always goes, obviously.
Of course, we know AI has seriously reshaped how many businesses do all their stuff from recruiting people and coding and manufacturing, fulfillment, marketing, sales.
The list goes on.
Take deepfakes in the business world, for instance.
With a veritable cornucopia of AI-powered tools available, people without much training can create highly realistic fake identities.
We've heard about scammers posing as C-levels on video conferencing calls to dupe employees into big payouts, right? We even talked about that in the show.
And the worry here is that these deepfake candidates pose a rather acute threat particularly in industries that are reliant on remote hiring.
So things like IT, finance, healthcare, cybersecurity.
And this all follows last May, analyst firm Gartner published its predictions saying 1 in 4 job candidates globally will be fake by 2028.
And the thing is, we're not just talking about an applicant attempting to put a bit of spit polish on their true identity or to skirt around a background check.
It seems there's a mounting concern of organized criminals and nefarious state hackers. So I'm very interested in what you think about this, Joe.
Maybe it's teenagers, but these guys using artificial intelligence to pose as remote job applicants in an effort to infiltrate companies from the inside, steal data, hold them to ransom.
So a company called Pindrop— this is a company that offers tools to help detect fakes— but they did a spot of research last week saying it has seen applicants from across the globe creating as US-based candidates.
So they name Russia, China, Pakistan, and parts of Africa. So they have this interview candidate they called Shamar, and he sailed through the initial screening, right?
So Shamar's resume looked like a perfect match for the role. They were looking for a software engineer, so he had experience building scalable systems in Python and Go.
He had familiarity with cloud environments like AWS and direct alignment with key technologies in their stack. So they're interested.
Shamar even referenced contributions to real-time systems in sensitive environments.
That means absolutely nothing to me, but they say that is exactly the kind of language that catches the eye of recruiters and hiring managers alike.
So they were basically running this job search, and they were then looking at everyone that was coming in to see if they were deepfaked or not.
They write that his work history checked out too. So he held roles for 2 or 3 years at a time with a clear and logical progression from junior to senior positions.
His resume was well-structured, clean formatting, concise bullet points. I mean, everything that AI can do these days.
So his LinkedIn profile included a verification badge, the kind that LinkedIn displays when a user has verified specific information, like their identity or employer, that sort of stuff.
And it was the kind of resume that they say they see, they trust from experienced engineers in today's remote talent market.
However, in their postmortem, they reported that Shamarr used high-fidelity face swap, clear audio, strong English fluency, fast response times, and long polished answers, some of which were likely to be AI-assisted.
And they figured that out by apparently coming prepared to detect for AI-assisted interviews by pre-testing the questions against common LLMs to anticipate potential responses.
In fact, I have a slight personal interest in this because someone recently launched their service, which claims to be able to help you to get through any job interview online by listening in and giving you the answers.
And they've called this damn thing Cluley AI. So they're using—
And my search engine optimization has completely tanked since these guys came along, this AI startup. I know this is why I'm really complaining, but apparently it's—
I can't really think of a good use of the deepfake technology. We've got this way of swapping faces now.
And if you're a Hollywood producer and you're making a film or whatever, I can see how that will be useful. But—
And, you know, I can see that as being a use case that is unethical. Illegal in some cases, of course. But then what else is there?
You hear about deepfakes being used to victimize women and for people to use them for BEC scams and stuff like that.
As a technologist, I shouldn't be saying that, but there are some technologies that you just think, why? Why is it here? It doesn't feel like it's a good idea.
So that was a kind of, "Oh, that's odd," since he claimed to be a US-based person.
And the IP address found across two of Shamar's interviews was linked to a known Astral VPN range, an anonymization service repeatedly cited by Mandiant and Unit 42 from Palo Alto as a key obfuscation tool used by DPRK, also known as North Korea.
There's this whole industry of potentially thousands of North Koreans who run multiple jobs at the same time, earning normal wages.
And if it goes wrong, there have been cases where they steal the company's data on their way out and use that as another way to make money. I think it's just fascinating to me.
And what's really interesting about this technology as well is the other day I did sort of a talk about it and we were discussing it and I kept having to say, hang on a minute, I did that story, but that was 3 months ago or 6 months ago or 9 months ago because it changes so fast.
Right now, it used to be the case where if you've got someone on a Zoom call, if you get them to wave their hand in front of their face, then that is the giveaway.
But the latest stuff even fixes that problem.
I've also seen people say, well, get the person you're interviewing to share their screen in case they've got other, but again, they're ready for that now.
They can really convince you that they are genuine and they're not necessarily. And of course, remote working has opened up so many more opportunities for this.
A robust identity verification process that includes verifying all contact details and working with specialized providers for sensitive roles. Ka-ching!
That adds a zero to your process.
Require candidates' camera be on during interviews, ask in-depth questions, and watch for evasive answers.
But again, I think anybody in a job interview is going to give something evasive at some point, aren't they?
And I mean, especially in the cybersecurity industry, you'd expect people to use VPNs, you know, and maybe their exact number, but use a VoIP number instead.
And then they say, of course, in-person onboarding, make that mandatory wherever possible.
So I mean, I'm just reading this and thinking this job recruitment has never sounded so fun, you know?
So, good luck millennials, good luck Zoomers, bonne chance, and the Alphas, hopefully it'll all be clear and great by the time you hit the market.
Oh my goodness. It takes forever to hire someone and add all that stuff in as well.
Graham would be "sorry, I'm a very busy man and I don't drink coffee." If you're a security or IT professional, you've got a mountain of assets to protect: devices, identities, and applications.
It's a lot, and it can create a mountain of security risks. Fortunately, you can conquer that mound with 1Password Extended Access Management.
Thankfully, Trelika by 1Password can discover and secure access to all of your apps.
Then pre-populated app profiles assess SaaS risks, letting you manage access, optimize spend, enforce security best practice across every app your employees use.
That's 1password.com/smashing.
Flare gives security teams real-time visibility into cybercrime forums, Telegram channels, Stealer Logs, and darkweb marketplaces, so you're not blindsided by the threats.
Think of Flare as your exposure management platform built to help you detect, prioritize, and respond with lightning speed.
Head to vanta.com/smashing to learn more. That's Vanta, V-A-N-T-A, dot com, slash Smashing Security. Smashing. And thanks to Vanta for sponsoring Smashing Security.
Could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app. Whatever they wish.
It doesn't have to be security-related necessarily.
Everyone said, oh, we'll go to Mastodon because we hate Twitter now.
But I used to use the standard Mastodon web client on my desktop computer, but I found it a real pain because that's my own personal account.
But there was also the Smashing Security account, and to switch between both of them, I had to log out and then log in again with a different password and then go in and out.
Oh, I was getting really frustrated with it, and I wanted something that wasn't going to irritate me on my desktop, and I have found it.
So for those 3 of you listeners who still use Mastodon, this is my recommendation. It's called Phanpy. Now it's spelt a little bit peculiarly.
It's P-H-A-N-P-Y, phanpy.social, and it is free.
I don't know which particular part of Asia he's from, but it is a free website.
It's a minimalist Mastodon web client, which can handle multiple accounts, runs entirely inside your browser. So you can use Chrome or Safari or Firefox.
Doesn't gain access to your accounts, which is obviously really important. Has some nice features like a catch-up, which shows you a sortable list of posts within the last hour.
We can make it up to 12 hours. Doesn't scroll infinitely, so you can feel you're done. It's really helped me get a proper handle on my Mastodon presence.
I am on Bluesky as well, and LinkedIn, and those sort of places too, but it's really helped me in terms of Mastodon.
And that is why my pick of the week is Phanpy, P-H-A-N-P-Y, dot social.
It's hard to put our finger on exactly what went wrong. But—
I'm afraid I'm going to choose something really, really sad, but something that I just cannot get enough of. It's my mini pond in my garden.
And yes, if you put the two and two together, I am a garden geek when I'm not on my computers.
And when I work, I work from home, I go out and have a cup of tea and stare into the abyss.
And someone on the BBC once did a little story about his mini pond, our climate editor, Justin Roller. I don't know him, but he's a great correspondent.
And he talked about it on BBC Breakfast as being, you know, it doesn't even have to be that big, like the size of a large plant pot in the ground.
Fill it with water, and in a few months, you've got what he described as a cauldron of life.
And very nastily, I remember the breakfast presenters, once his package had finished, it came back to them and they both laughed at him for saying cauldron of life.
But it is, it is a cauldron of life.
And I put my GoPro in there the other day and I've got a newt in there and a frog and these little, I don't know, like woodlouse, underwater woodlouse.
And I've got some snails that my neighbour gave me as well. And it's just, I love it. It's brilliant.
I was like, what is going on? And I walked up to it and there were about 40, no joke, I counted them, dead slugs just floating in the water. And I've no idea what happened.
I think one or two fell in. And of course slugs eat slugs. So I think a few of them went, oh, that looks tasty. Fell in, another one went, that looks tasty, fell in.
So over the course of two weeks when I wasn't there doing my usual—
And without me to remove the carcasses, I think it can quite easily become a death trap. So that aside, mini pond, everyone should have one. They're awesome.
This is the bit that I don't like as much, right? With the Free Hitster app that automatically plays the song in Spotify.
So you all listen, and then you decide where it sits in the timeline. And everyone gets a guess. Someone's right, someone's wrong. Yay! We know we're one step closer to winning.
You could play, as long as someone's playing the Maestro, they would just be able to have a list of the songs, play them, and then you could make a list.
I think you could do it pen and paper as long as someone's playing it. Who was going to be the boss.
I'm sure lots of our listeners would love to find out what you're up to and follow you online and maybe find out some more about your book. What's the best way for folks to do that?
And don't forget, to ensure you never miss another episode, follow Smashing Security in your favorite podcast app, such as Apple Podcasts, Spotify, and Pocket Casts.
It's their support that helps us give you this show for free.
For episode show notes, sponsorship info, guest list, and the entire back catalog of more than 422 episodes, check out smashingsecurity.com/podcast. Smashingsecurity.com.
Hosts:
Graham Cluley:
Carole Theriault:
Guest:
Joe Tidy – @joetidy.bsky.social
Episode links:
- Operation Endgame.
- Ctrl+Alt+Chaos.
- Lizard Squad Member: Why I Took Down Xbox and PlayStation – YouTube.
- Reckoning With the Rise of Deepfakes – The Regulatory Review.
- Deepfake interviews: Navigating the growing AI threat in recruitment and organizational security – Fast Company.
- Why Your Hiring Process is Now a Cybersecurity Vulnerability – Pindrop.
- Best Practices for Defeating Deepfake Candidate Fraud – Dice Hiring.
- Phanpy – A minimalistic opinionated Mastodon web client.
- How to make a mini pond – Gardener’s World.
- Hitster board game.
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
- Support us on Patreon!
Sponsored by:
- Vanta– Expand the scope of your security program with market-leading compliance automation… while saving time and money. Smashing Security listeners get $1000 off!
- Flare– Uncover the latest threats across the dark web and Telegram. Start your free trial today.
- Trelica by 1Password – Access Governance for every SaaS app. Discover, manage, and optimize access for any of your SaaS apps – whether managed or unmanaged.
Support the show:
You can help the podcast by telling your friends and colleagues about “Smashing Security”, and leaving us a review on Apple Podcasts or Podchaser.
Become a Patreon supporter for ad-free episodes and our early-release feed!
Follow us:
Follow the show on Bluesky, or join us on the Smashing Security subreddit, or visit our website for more episodes.
Thanks:
Theme tune: “Vinyl Memories” by Mikael Manvelyan.
Assorted sound effects: AudioBlocks.
