Breach Log - Every hack has a story to tell cover art

Breach Log - Every hack has a story to tell

Breach Log - Every hack has a story to tell

By: Jai Minton
Listen for free

Summary

Breaches happen every single day, and behind every breach is a story. These are the stories from those involved. It's the stories of those who found, or responded to a breach, or even those who were impacted. Join us as we shine a light on what really happens behind the scenes during a hack, and all the events that follow. This is Breach Log. Do you have a story to share? Reach out via one of my contacts at https://www.jaiminton.com/, or email me (removing the spaces): breachlogpodcast @ gmail.comJai Minton True Crime
Episodes
  • Ep4: Think Twice Before You Fix It with Cameron
    Apr 7 2026

    What happens when a critical alert comes in on a system at 2am? Follow along with Cameron's story to find out more.

    Want to get technical? Read some public reporting:

    • Microsoft
    • Trend Micro
    • Huntress
    • Push Security
    • IDAT Loader YouTube 1
    • IDAT Loader YouTube 2

    ---------

    Credits:

    Music by various artists from ⁠⁠⁠Pixabay

    Show More Show Less
    35 mins
  • Ep3: Care to Exchange 0-days
    Mar 6 2026

    What happens when a leak leads to a global cyber attack? What about when it's against systems with some of the most sensitive data in your organisation? Follow along as we recount the events detecting, responding, and investigating 0-day vulnerabilities being exploited in the wild.

    This story comes from the host of the show, Jai Minton

    Want to get technical? Read some public reporting:

    • ⁠Volexity
    • CrowdStrike
    • Microsoft
    • Penn Elcom (Parcel Study)
    • CISA
    • Microsoft again

    ---------

    Credits:

    Music by various artists from ⁠⁠Pixabay

    Show More Show Less
    23 mins
  • Ep2: The Unseen Impact of Ad Fraud with Max
    Feb 4 2026

    You download, install, and run some software, and you get what you asked for, only with a little something extra. How can you tell whether the something extra is purely for ad fraud, or for something more sinister?

    This story comes from Max Margolis⁠.

    Do you have a story you'd like to share? Get in touch: breachlogpodcast [@] gmail.com

    Want to get technical? Read some public reporting:

    • Trend Micro
    • Fortinet
    • BitDefender
    • CATO Networks
    • Bleeping Computer

    ---------

    Credits:

    Music by various artists from ⁠Pixabay

    Show More Show Less
    33 mins
No reviews yet