
In episode 452, a London-based YouTuber wins a landmark court case against Saudi Arabia after his phone was hacked with Pegasus spyware — exposing how a single, seemingly harmless text message can turn a smartphone into a round-the-clock surveillance device.
Plus, we go looking for professional hitmen online – only to uncover uncomfortable questions about why some crimes attract customers but very few complaints.
All this and more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veteran and keynote speaker Graham Cluley, joined this week by special guest Joe Tidy.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
Hello, hello, and welcome to Smashing Security episode 452. My name's Graham Cluley.
Of course, you are the author of Control Alt Chaos, the book which we were talking about last year about some of the astonishing hacking, particularly that case which happened with the Vastaamo Psychotherapy Clinic over in Finland and the chap who was behind all of that.
And, you know, the fact that he, Julius Kivimäki, went directly after the patients and emailed them and said, I've got your therapy notes, pay me or I'll publish them online.
You know, the impact that had on people was absolutely enormous. And that's what the book addresses.
And also this kind of cycle that we're in where young boys fall down a dark path towards cybercrime.
But yeah, big launch in the US and Canada now this week. Very excited.
So I'm sure the listeners of Smashing Security will know Evil Corp, the infamous Russian cyber gang I describe them as kind of the cockroaches of cyber because they just won't die.
They sort of evolve as the cybercrime underworld has changed and shifted. So they started off in banking Trojans in the early days, sort of 2009, 10, and then moved into ransomware.
Now there's pretty decent evidence that they could be working directly with the Russian state.
So we've done a whole podcast series all about it called, as you say, Cyber Hack Evil Corp.
And actually, I remember it very vividly, lying on the sun lounger, my hammock in my garden one summer.
And I thought to myself, huh, there's another load of Russians here that have been named and shamed by the West as being cybercriminals. We never hear from these individuals.
And it was Maksim Yakubets was doing the rounds and Igor Turashev, these names, they have pictures everywhere saying these are guys responsible for hundreds of millions of dollars worth of damage.
Let's go there and try and find them. A stupid idea, obviously.
So we managed to knock on lots and lots of doors around Moscow looking for these guys and elsewhere.
We went to a place called Yoshkar-Ola as well, 1,000 kilometres to the east of Moscow. Just shows how big Russia is. And we spoke to the father.
So that's actually, we've kind of dug up some of that material for this latest series that we've done on BBC World Service.
But, you know, we've done some new stuff as well, and we've told the story in much more depth and detail about this family.
And I co-presented it with Sarah Rainsford, who's the former Moscow correspondent at the BBC, speaks fluent Russian. She's an awesome lady, and we had a great time.
This week on Smashing Security, we're not going to be talking about how Windows PCs have been refusing to shut down after a buggy Patch Tuesday. Newsday Update.
You'll hear no discussion of how Russian-linked hackers are being blamed for an attack on the Polish power grid.
And we won't even mention how 31 more people have been arrested in connection with a malware scheme designed to steal money from ATMs.
So Joe, what are you going to be talking about this week?
Well, we've got time right now to hear from one of our sponsors, Passwork. If you work in cybersecurity, you already know this. Most secrets don't get stolen, they leak.
Passwords pasted into chat tools, shared admin accounts, those spreadsheets everyone pretends don't exist. Passwork is built to stop that.
It's a password manager and secrets management platform designed for organisations that want on-premise deployment, meaning your sensitive data stays on your own infrastructure under your control.
That matters if you're dealing with regulatory requirements, data sovereignty, or simply don't want your most critical secrets living in someone else's cloud.
From a security perspective, Passwork uses a zero-knowledge architecture with strong, openly documented encryption, and its design is regularly tested by independent security researchers.
Operationally, it's built for real teams.
Role-based access control, integration with existing identity systems, support for MFA, highly available architecture designed to keep things running when parts of your environment fail.
And unlike those tools that look cheap until you start paying for them in time and stress, Passwork focuses on long-term stability, a public development roadmap, and a lower total cost of ownership.
Passwork, it's not just a password management platform, it's a secure, adaptable secrets manager built to meet your business needs.
To find out more, go to smashingsecurity.com/passwork. That's smashingsecurity.com/passwork. So Joe, I've got a question for you. Do you have a nemesis?
There are websites called things like Besa Mafia, Camorra Hitman, or my personal favourite, the delightfully unimaginatively named Number One Hitman Marketplace.
You could imagine this. And these websites, they promise to connect you with professional assassins. 'Cause you don't want an amateur assassin.
If you're going to pay for the job, you want it done properly, right?
You provide them with the address of the target, maybe their daily routine. You specify how would you like them dispatched?
So, a typical one would be, make it look like a robbery gone wrong.
An unusual one would be, I want it to look like a steamroller has careered down the high street and flattened them. Whatever it may be.
And he just could walk out the way, but he doesn't do it. Of all the things, a steamroller, you wouldn't choose that.
Of course, some people feel like they're going to get scammed. It's like, well, you know, this may be a con. How do I— I mean, you guys are criminals.
How do I know if I give you all this bitcoin that you're not just going to run away with it? And these sites can have escrow systems.
Because even legitimate murder-for-hire operations are keen on protecting their customers and their consumers. And so they say, well, we will keep it in escrow.
And so we won't get our hands on it until the job is done properly, which is obviously marvellous, right? Customer service.
So if you have a friend who wants someone murdered, you can get them to sign up on these sites and you will earn a 10% commission, apparently.
So you can hand out links to people and say, oh, you're looking for an assassin? I can't help you. Try this link. And you will then eventually get this payment.
And if you go to these sites, you'll even find customer reviews. I don't think they're on Trustpilot.
I don't think you'll see them there, but you'll see them listed on the actual website saying what a great job which they've done.
And these whole operations are being promoted by freelance search engine optimisation experts based in India.
They've been hired to make sure that Besa Mafia appears at the top of the Google search results if you look for hitman for hire and these other sites or pages which then tell you to install the Tor browser and go and visit.
And what's just happened is that some authorities in Romania have just conducted raids in Bucharest and Râmnicu Vâlcea, a city which is so notorious for cybercrime that it is literally nicknamed Hackerville.
And they are questioning two men, aged 33 and 35, who they say are connected to a website called Online Killers Marketplace.
And this was done at the request of UK authorities who are investigating charges, including incitement to murder and money laundering as well.
And this is where it gets interesting, right? These websites are making money. They have customers. But also, these websites are almost certainly scams.
So when you go online, I'm afraid to anyone who did want to hire a hitman, if you go online looking for a hitman—
Yeah, so I remember with that one, a cybersecurity researcher found that the hitmen website on the darknet was really badly secured, so he could read all the messages.
Found hundreds of names of what is known as the kill list. He exposed this person known only as Yura, who would string along customers with excuses.
So you'd pay your money for the assassination, then he'd say, "Well, look, the assassin's been a bit busy. He's got problems getting a flight.
Maybe you can hand over a bit more money.
He's just been arrested for cocaine possession, but I've got this other assassin who can step in, but he's gonna require a larger payment." And so they would con you out of further amounts of cash, rather like the romance scammers.
And of course, the victims— I put them in quotes— the victims, the people who are trying to hire hitmen, it's not as though they're gonna go to the police, are they?
So the main cybercriminal in my book is Julius Kivimäki, this guy that hacked the Starmo psychotherapy chain. But he also did lots of other cybercrimes when he was a teenager.
And the most recent thing he's been accused of is super smart, and it's almost the perfect crime, similar to what you're describing here.
So what he did was he hijacked the Google pages for drugs marketplaces on the darknet, changed those Tor addresses to ones that he controlled.
It's all alleged, hasn't been proven in court. And then so people would search the clearnet for where to buy their drugs. They go on the darknet links.
It all looks the same as the actual real marketplaces that are in inverted commas legitimately selling drugs.
But of course, all the money that people are paying for the cannabis and MDMA and cocaine, it's going straight to him.
So as I said, this researcher, he exposed this person called Eura. So he was outed. But then the researcher was on the receiving end of threats from Eura themselves.
So this person who claimed to be running a hitman-for-hire site started threatening the researcher.
He hired freelancers to create fake websites and blog posts claiming that Montero himself was actually running this hitman-for-hire website.
And in fact, back in February 2017, apparently he was eating pumpkin soup in his London flat. That's the kind of detail which I enjoy.
And now he was eventually released, but you can imagine spending years being on the hunt, unmasking a cyber scammer, and then find yourself arrested and being accused of the person who was actually doing it.
It's a bit if it happened to you, Joe.
And the investigation eventually led to around about 30 convictions around the world, and people were put in prison as a result of doing this.
Although it has since been claimed, in fact quite recently I believe, there may have been an additional 2,000 kill orders which had gone through that website.
Tragically, in at least one case, where a hired hitman predictably never materialized, the customer actually took matters into their own hands.
There was a Minnesota man named Stephen Allwine, church deacon. He paid $12,000 to have his wife, Amy, killed through the Besa Mafia website.
What he didn't know was that the site had been hacked by the security researcher and was passing the information to the FBI. The FBI went round to his house to warn his wife.
They sat down with his wife, with him in the room, and said, "We want you to know that someone has been on the internet trying to hire a hitman to kill you." The FBI didn't know that the actual person who'd done the hiring was there in the room.
And a few months later, she was killed by him. Absolutely ghastly.
The FBI is saying, "Oh, you wanna beef up your home security?" What they didn't know was there was the person right there and then who was ultimately gonna commit the crime. Wow.
Turned out he was also an active user of Ashley Madison. I don't know what we can read into that as well, but— Hmm.
So, we've got this bizarre situation where a criminal scam designed to steal money from would-be murderers actually saved some lives by taking their cash and doing nothing.
But we also saw the researcher who exposed it getting arrested thanks to the scammers' superior SEO skills and the FBI warning murder victims about their potential impending death while the killer sat behind her.
It's just ghastly. And now we've had these latest raids in Romania encouraged by the UK authorities. It really sounds the same scam is happening once again.
Just as it happened before, other websites are being created claiming you can hire a hitman. And in fact, it's a scam.
You said, this is a cybercrime where there may be no reports of a scam actually happening because why would people ever do this?
So if you're listening to this and they've ever been tempted to search for a hitman on the darkweb, you're almost certainly going to get scammed.
And quite frankly, I'm pleased that you're going to get scammed.
I think from memory, maybe it had been two people, and he went through the process of hiring them and paying the money.
And then the hitmen, who were the police, sent pictures back faking the murder.
Yeah, I don't know why people are trusting online hitmen to carry out the job you pay them for, because there's an absolutely enormous history of this going back now.
What was Silk Road, 2011, 2012?
They can spot suspicious logins, they can see dodgy activity, they get the alerts. But here's the problem: detection isn't enough.
Because when an attacker gets into your Microsoft 365 tenant and starts quietly changing the settings, disabling conditional access, weakening Defender policies, elevating admin roles, the noise often stops.
And that's when the real damage begins. This is how Microsoft 365 tenant takeovers actually happen. According to CoreView, 63% of tenants are still handing out broad admin rights.
One compromised account and suddenly the attacker has the keys to the kingdom. And if those configurations get tampered with, your backups won't save you.
You could spend weeks trying to rebuild tenant settings by hand because Microsoft doesn't give you a native way to roll back tenant-level changes.
Attackers know this, they count on it. And that's why CoreView has published a new whitepaper called Total Tenant Takeover: The Microsoft 365 Disaster No One Is Ready For.
It looks at how these attacks unfold in the real world, where least privilege breaks down, and what it actually takes to recover a Microsoft 365 tenant.
Not just files, but the whole environment. You can download it right now at smashingsecurity.com/coreview. That's smashingsecurity.com/coreview.
So Joe, what are you going to talk to us about this week?
And all the time NSO have said, "Look, we made this spyware, but it's only being sold to governments and it's only going to be used to bring down terrorists and organized criminals, that kind of thing." But we know now after so much evidence over the last four years or so that NSO Group has been selling to places that have been misusing it.
And it's been governments around the world, repressive regimes that have used NSO Group's Pegasus spyware to infect the phones of dissidents, political opponents, journalists, human rights activists, that kind of thing.
So we know this has been happening and it's just absolutely fascinating to me that here is a really solid case that's gone through the courts, and Saudi Arabia's now got this unprecedented fine of more than £3 million to pay to this guy.
And it also brought back to me some reporting I did on Pegasus back in, oh, it would've been about four years ago now, where I got one of my producers, brilliant producer called Jo Worley, I asked her to spy on me through my phones because I managed to get hold of some spyware that was similar to Pegasus.
You can buy it. They pretend that they're selling it to parents to look out for their children. In some cases, people buy it legitimately.
I don't know if it's legitimate or not, but one of the use cases that they claim is that workers can be spied on or be monitored by their managers.
But of course, people use this stalkerware to spy on their spouses and things like that. So I put it on my phone following a really lengthy and pain-in-the-bum process.
It took me over 2 hours. I remember I had to call up customer support for this nasty company that was selling it. Anyway, got it on my phone and I said—
And in some cases it can be zero-click. So you can just make a phone call to somebody. They don't even have to connect with the phone call, just has to make a connection.
And then the phone gets infected with Pegasus. That is the secret sauce. That is the power of Pegasus.
We made a video about it where she watched me in my pajamas, sat there watching telly, playing Candy Crush.
And then she saw through the cameras and listened to the microphones when I was in a shop buying stuff from a stationery.
She managed to see me on a map, a little dot on a map where I was when I was cycling around London. I mean, you name it, that phone could do it.
It became the ultimate espionage tool.
And that's what happened to this Saudi YouTuber, because as well as being a dissident, Ghanem, he started a YouTube channel in about, I think it was 2015.
And then in 2018, that's when he had that infection with Pegasus and things started getting really, really weird for him.
And I've got here the court documents and I was gonna show you exactly what happened and how he got infected.
'Cause I think the listeners to Smashing Security would be interested in that, wouldn't they?
The message he received on his iPhone 7 was reported from someone called Nikalej, which is apparently a Middle Eastern newspaper.
The text message stated, in translation, it would have been in Arabic, of course.
And that was enough. So we clicked on that and that installed Pegasus. And the second one, just for good measure, I think they did it twice.
Oh no, this is a different phone, that's why. It was an iPhone X this time, and that is sent out a few days later. And it was a classic one that we get all the time from scammers.
Dear customer, your DHL shipment number is this.
It was, you can manage your delivery at http://tinyurl.com/blah blah blah. That's smart. And it contained a link to a webpage with the URL sundaydeals.com.
And that was it for this man, unfortunately. That was how he got infected with Pegasus.
And, you know, in some cases it's a really interesting cyber sort of story, cyber espionage story, but it's also a human story as well.
'Cause this guy, his YouTube channel was enormous and is enormous. He's done really, really well, 300 million views since he started it.
But it's also since 2018, he started noticing there were people turning up where he was.
So, for example, strange incidents where at one stage, someone was— he walked out of a shop in London, and there was a little kid singing a song about Saudi Arabia and how wonderful it is, and saying that critics will be punished, and then someone filming her singing at him.
And then other instances as well, where people just happened to be exactly where he was and shouting things at him.
He's not that famous, you know, he's not famous enough people stop him in the street.
And then there was a really nasty incident in 2018 where he came out of a cafe in Knightsbridge. Again, you know, how did they know he was there?
And he was assaulted by two men, punched and beaten up, and they shouted slogans at him and things like that. And one of them was wearing an earpiece.
So, I think what's interesting for me is, you know, this is a really nasty story, and I spoke to him and he said, you know, "Having the spyware on my phone was like a shadow hanging over me.
At all times, I felt watched and listened to." He's scared to go into central London. He hasn't been back in central London.
But it's also a case, now that it's been through all these courts, hearings, and now we've got this definitive ruling from the judge, it feels, wow, okay, here's a real kind of evidenced picture of what it's like to have Pegasus on your phone and to be stalked and harassed and in some cases assaulted.
You know, this is rare. This is a rare thing.
But here's someone who lives in the UK, lives a normal life as a British citizen, but is being, you know, hacked and having their life really impacted by a government halfway across the world.
When you hear these stories about journalists and people having Pegasus on their phone, it's Citizen Lab who will take the device and they will do a search and they will scan it and they'll find it.
And that's how you get this trail of, the text message here led to all these URLs being accessed and then all this data exfiltrated, all that sort of stuff. So they confirmed it.
So you've got a sneak peek of my unpublished reporting. Okay, so the total damages awarded by the court are £3,025,662.83. Where did that 83 pence come from?
How— Why did they put that in? I don't understand.
I mean, it's great that the judgment has happened.
And since then, since their political immunity has been removed, Saudi Arabia has not participated in any of the court hearings.
So the judge said that everything that's been decided is because Saudi Arabia doesn't seem to have any defense and doesn't seem to want to defend itself in any way.
Certainly, we're going to, as other journalists have, reach out to them and see if they've got anything to say on this.
But they've just remained silent ever since that immunity's been taken away. And I spoke to Ghannam and I said, congratulations, you've got the compensation potentially coming.
More importantly, you've got this ruling, but do you really think you're going to get paid? And he said he has no idea.
The Saudi Arabian government is very unpredictable, is how he described it. But he said that there are other mechanisms he can use.
So for example, he will try and go to the international courts if Saudi Arabia doesn't pay. You're right, it's peanuts. It's peanuts. But does it in some way—
Well, imagine one that doesn't just write haikus about zero-day vulnerabilities, but actually does your audit work for you. That is Vanta.
It connects to all of your tools, gathers evidence, tracks compliance, and quietly helps you prove that yes, you do take security seriously. Vanta automates all of that.
It pulls everything together, keeps an eye on your systems, and basically makes sure you're ready for an audit at any time, which means no last-minute panic for screenshots and policies.
It also plugs into the tools you're already using and flags up issues before they become a right old mess.
So if that sounds something that might save you from a few sleepless nights, check out vanta.com/smashing. And if you use that link, you'll get $1,000 off.
So don't forget, vanta.com/smashing. And thanks to Vanta for sponsoring this week's episode. On with the show. And welcome back.
And you join us at our favourite part of the show, the part of the show that we to call Pick of the Week.
Could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app, whatever they wish.
It doesn't have to be security related necessarily. Well, my pick of the week this week is not security related.
I was on the Channel 4 on-demand streaming service and I found this movie. Came out a few years ago and it is a comedy drama martial arts coming of age fantasy.
Her older sister, Leena, is an art school dropout, and she's seduced into a marriage with a smarmy git. And her little sister is not at all happy about this.
And so, spurred on by her rather overactive imagination as to what this man might be like who is wooing her sister, she comes up with devious machinations as to how to ruin their relationship.
And she tries to engineer a breakup with the help of her school friends. This movie is utterly bonkers. And I promise you, you will watch it with an enormous smile on your face.
I found it incredibly charming. And just when you think this cannot get— I mean, there is lots of martial arts.
It's amazing kicking and it's all sisters together and all the rest of it. It's very funny, very stylishly done, a bit like a Bollywood movie in some ways.
And then in the third act of the movie, the last third, things go—
I was not expecting it to be a comedy drama martial arts coming of age fantasy with beep elements in it as well.
It had great reviews, but hardly made any money at all.
If you can't see it anywhere else, it is currently on Channel 4. Of course, 4-player or whatever they call it. And I enjoyed it a great deal. So that is my pick of the week.
So you know something's coming, but yeah, you have to get probably, what, 45 minutes in until there's some actual vampire action?
So I think I chose my pond once. Yes. And a wildlife camera where I managed to get a rat on camera. So this one's equally as random. I have become a 3D printing geek.
Over Christmas, I got myself a 3D printer.
I used to be a real geek at sort of Games Workshop and Warhammer.
I never actually played them, but me and my kids for the last sort of 6 months have been coming up with an idea for a board game based around, you know, little miniatures.
And I thought instead of sending them off to be printed from someone else, I'm gonna make them myself. And I've just loved it. I've loved every second of it.
In fact, I've banned myself the last few days from using the 3D printer because I've just been so obsessed. There's something about it.
You just set it going and then 2 hours later you come back. Has it worked? Hasn't it worked?
The kids are well away from it. But I sort of hit a groove, and now I've got my little army of these little miniatures, which I've been setting out like a complete dork.
But I love it. I absolutely love it. And what's been a really interesting part of the process has been the use of AI.
So in the BBC, and I'm sure it's the same in many places, there's a very cautious outlook on using AI because it's potentially a security risk and it makes mistakes and stuff.
Yeah, but on my own, just unleashing the creativity, it's been absolutely incredible. So I've asked Google Gemini to create an alien soldier.
Then I've asked another program called Meshy to create that 2D image into a 3D model.
Then I've gone into another one that actually allows you to build the models in the 3D printing software.
And it's actually informed my reporting a little bit because, you know, we talk about AI quite often, we talk about the downsides, but then actually, you know, it's opened up.
I wouldn't have been able to do this two years ago. There's no way.
You know, it's like, if it does too much for you—
I think, would I get more out of it if I actually did the illustrations for these things myself? Yes. Would I get more out of it if I somehow turned a 2D image into a 3D model?
Yes, that would make me so much more computer skillful. You know, I don't know how— I don't even know how you do it. But would I do it? No.
And I look back and I think about my poor parents and the hundreds and hundreds of pounds of their money, their hard-earned cash that I spent on these stupid little figurines, which I'm now knocking out, you know, in the space of a couple of hours in my garage.
And it's just fascinating to me. And I strongly recommend it. It's not crazy money. You know, I think the 3D printer was about £250.
I'm sure lots of our listeners would love to find out what you're up to and follow you online. What's the best way for them to do that?
I mean, basically everything except Twitter these days. And you can find out about my book, Control or Chaos, just give it a Google. And I see Graham behind you on the bookshelf.
I see my book and it makes me very, very happy. Thank you very much. There you are. There it actually is.
And don't forget to ensure you never miss another episode. Follow Smashing Security in your favorite podcast app, such as Apple Podcasts, Spotify, and Pocket Casts.
For episode show notes, sponsorship info, guest lists, and the entire back catalog of over 450 episodes, check out smashingsecurity.com. Until next time, cheerio. Bye-bye.
Thanks so much to Joe Tidy for joining us this week, and to this episode's sponsors, Vanta, Password and CoreView.
And of course, to all of you chums who've signed up for Smashing Security Plus over on Patreon.
They get the benefit of ad-free episodes and early access to new episodes of Smashing Security as well, of course.
Those people include: Henry Warshaw, who sounds like he should be captain in a cricket team. Christophe Goossens, who almost certainly has strong opinions about beer.
Sonky Von Rappel, which feels like a Bond villain. Jay, who's decided to remain gloriously minimalist with just the one character.
Maya has brought her own explanation mark for emphasis. Ragnar Karlsson, Graham Cluley, who arrives wielding an axe and demanding better multifactor authentication.
Meanwhile, Richard Mortner owns a very serious fountain pen, and Mark Norman finishes things off like a man who's definitely reset your router at least once.
Would you like to hear your name read out at the end of the show from time to time? Well, Smashing Security Plus may just be for you.
Of course, I know not everyone can stretch to $5 per month, and that's perfectly fine if you can't afford to sign up for Smashing Security Plus.
There's absolutely no pressure to become a patron. What you could do is you could tell your friends that you really like Smashing Security instead.
Every little bit helps, and it really does make all the effort worthwhile. Well, I hope you've enjoyed this week's episode and are going to tune in for next week's as well.
Until then, cheerio, bye-bye.
Host:
Graham Cluley:
Guest:
Joe Tidy:
Episode links:
- Sorry Dave, I’m afraid I can’t do that! PCs refuse to shut down after Microsoft patch – The Register.
- Russian state hackers likely behind wiper malware attack on Poland’s power grid – The Record.
- US charges 31 more suspects linked to ATM malware attacks – Bleeping Computer.
- Dark web arrests in Romania linked to portal which offered services including murder – ROCU.
- Romanian scammers ran fake hitman-for-hire site, lured desperate perpetrators as ‘incompetent assassins’ – Fox News.
- This Fake Hitman Site Is the Most Elaborate, Twisted Dark Web Scam Yet – VICE.
- Unlikely Assassin, The Murder of Amy Allwine – Rooster.
- Saudi dissident awarded $4.1 million by UK court for hacking, assault ‘by Saudi Arabia’ – Reuters.
- Stalkerware: The software that spies on your partner – BBC News.
- Using ‘stalkerware’ to spy on a colleague’s phone – YouTube.
- “Polite Society” trailer – YouTube.
- Elegoo Saturn 3 3D printer – Elegoo.
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
Sponsored by:
- Passwork – a reliable secrets manager and password management solution.
- Coreview – Download “Total Tenant Takeover”, a white paper about the Microsoft 365 Disaster No One Is Ready For.
- Vanta – Expand the scope of your security program with market-leading compliance automation… while saving time and money. Smashing Security listeners get $1000 off!
Support the show:
You can help the podcast by telling your friends and colleagues about “Smashing Security”, and leaving us a review on Apple Podcasts or Podchaser.
Join Smashing Security PLUS for ad-free episodes and our early-release feed!
Follow us:
Follow the show on Bluesky, or join us on the Smashing Security subreddit, or visit our website for more episodes.
Thanks:
Theme tune: “Vinyl Memories” by Mikael Manvelyan.
Assorted sound effects: AudioBlocks.

