
Hosted by Chris Tarbell & Hector Monsegur · EN

Chris and Hector break down a series of AI and cybersecurity failures, including an autonomous coding agent that deleted an entire production database, a breach exposing voice and biometric data from 40,000 AI contractors, and major GitHub and supply chain vulnerabilities. They also discuss the growing risks of AI decision making, deepfakes, and why basic security failures continue to spiral into massive incidents. Join our Patreon for weekly bonus episodes: https://www.patreon.com/c/hackerandthefed Send HATF your questions at questions@hackerandthefed.com

Chris and Hector break down a wild mix of cyber stories, including a U.S. soldier charged for betting on a classified military operation, ongoing North Korean crypto theft campaigns, and major security failures across APIs and SaaS platforms. They explore how insider threats, poor security practices, and repeated mistakes continue to drive massive breaches and real world consequences. Join our Patreon for weekly bonus episodes: https://www.patreon.com/c/hackerandthefed Send HATF your questions at questions@hackerandthefed.com

Chris and Hector break down a week of cybersecurity stories, from Europe’s push to move away from U.S. tech to supply chain attacks, insider threats, and SaaS compromises. They dig into why modern security tools still fail, how attackers exploit trust in third party systems, and why some breaches matter far less than headlines suggest. Join our Patreon for weekly bonus episodes: https://www.patreon.com/c/hackerandthefed Send HATF your questions at questions@hackerandthefed.com

In this episode, Chris and Hector revisit their origin story, from the investigation that led to Sabu’s identity to the night the FBI showed up at his door. They walk through the arrest, the decision to cooperate, and the months spent working side by side to dismantle major hacking operations. It is a firsthand account of how one of the most infamous hackers became an informant and how that unlikely partnership shaped both of their lives. Join our Patreon for weekly bonus episodes: https://www.patreon.com/c/hackerandthefed Send HATF your questions at questions@hackerandthefed.com

Chris and Hector break down a highly effective North Korean supply chain attack that started with a fake Microsoft Teams update and escalated into full developer compromise. They explore how modern attackers combine social engineering, open source manipulation, and long term access to infiltrate software pipelines. The episode also covers GitHub based attacks, compromised routers at scale, and why simple human pressure remains one of the most powerful tools in cybercrime. Join our Patreon for weekly bonus episodes: https://www.patreon.com/c/hackerandthefed Send HATF your questions at questions@hackerandthefed.com

Chris and Hector are joined again by an anonymous CISO for a candid follow up conversation on the realities of modern cybersecurity. They explore why compliance often turns into security theater, how geopolitical conflict is shaping defensive strategy, and what actually keeps security leaders up at night. The discussion cuts through dashboards and certifications to focus on risk, trends, and the uncomfortable truth that many organizations look secure on paper while remaining deeply vulnerable in practice. Join our Patreon for weekly bonus episodes: https://www.patreon.com/c/hackerandthefed Send HATF your questions at questions@hackerandthefed.com

Chris and Hector break down a major compliance scandal where a startup allegedly sold fake SOC 2 certifications using templated reports and questionable auditing practices. They explore how the breach exposed sensitive internal documents, why companies may have knowingly gone along with it, and what it says about trust in the cybersecurity industry. The episode also covers a massive GPU smuggling case tied to China, the collapse of a major cybercrime forum, and a real-world prompt injection attack that compromised thousands of developer environments. Join our Patreon for weekly bonus episodes: https://www.patreon.com/c/hackerandthefed Send HATF your questions at questions@hackerandthefed.com

Chris and Hector break down a massive breach involving claims of a petabyte of stolen data and question how something that large could go unnoticed. They also dive into a critical vulnerability in McKinsey’s internal AI platform that exposed millions of records through basic API and SQL flaws, along with ongoing credential theft campaigns targeting VPN users Join our Patreon for weekly bonus episodes: https://www.patreon.com/c/hackerandthefed Send HATF your questions at questions@hackerandthefed.com

Chris and Hector break down a new US cyber strategy calling for a more aggressive posture against hackers, then dive into a bizarre case where a sophisticated iPhone exploit kit meant for espionage ended up powering crypto theft. They also revisit the arrest of a contractor’s son accused of stealing $46 million in seized cryptocurrency and discuss how bragging on Discord brought the whole scheme crashing down. Join our Patreon for weekly bonus episodes: https://www.patreon.com/c/hackerandthefed Send HATF your questions at questions@hackerandthefed.com

Chris and Hector discuss an AI assisted hacking campaign that compromised more than 600 Fortinet firewalls and what it reveals about persistent security failures. They also cover cyber operations tied to geopolitical conflict, leadership turmoil at CISA, and new research showing how AI can expose supposedly anonymous online identities Join our Patreon for weekly bonus episodes: https://www.patreon.com/c/hackerandthefed Send HATF your questions at questions@hackerandthefed.com