Podcast Episodes

Back to Search
Hotline Hacked Vol. 13

Schools out for summer. Another collection of computer confessions and strange tales of technology.


Hacked is brought to you by Push Security. Che…

9 months ago

Short Long
View Episode
The Lorebook Cult

Content warning: This episode contains descriptions of exploitation, self-harm, and abuse. Listener discretion is advised.

A network called 764 has …

9 months, 2 weeks ago

Short Long
View Episode
The 4chan Hack

We discuss a schism years in the making — the infamous imageboard 4chan gets hacked by its own offshoot, Soyjak.party, in a breach that exposed moder…

10 months ago

Short Long
View Episode
Hotline Hacked Vol. 12

A tech worker stumbles upon mass fraud and brings receipts, a flag football prank goes very right, a teenager uses Net Send and gets in trouble — but…

10 months ago

Short Long
View Episode
WebcamGate

In 2009, a Pennsylvania high school accused sophomore Blake Robbins of dealing drugs—based on a photo secretly taken through his school-issued laptop…

10 months, 2 weeks ago

Short Long
View Episode
The Killswitch Saboteur, AI Prompt Data Leak, and Bluetooth Chip Secrets Exposed

A former developer at Eaton Corp, Davis Lu, is convicted of deploying a kill switch script that disrupted thousands of users worldwide—he’s now facin…

11 months ago

Short Long
View Episode
Hotline Hacked Vol. 11

Hacked Discord accounts, zombie emergency alerts on TV, and a crime spree in Diablo 3—just another day. As always, thanks for sharing your calls with…

11 months ago

Short Long
View Episode
The $1.5 Billion Crypto Heist & Vibe Coding Beats Big Tech Interviews

Learn more about your ad choices. Visit podcastchoices.com/adchoices

11 months, 2 weeks ago

Short Long
View Episode
Hotline Hacked Vol. 10

Double Digits! Featuring caller stories of sarcastic keyboard pranks, failed SEO birthday gifts, vending machine hijinks and more.


Hacked is brought …

1 year ago

Short Long
View Episode
The Red Teamer

Adam used to break into companies for a living—legally. As a red teamer, he watched the attack surface shift from networks to endpoints to something …

1 year ago

Short Long
View Episode

Love PodBriefly?

If you like Podbriefly.com, please consider donating to support the ongoing development.

Support Us