Easy Prey
Ransomware isn’t a lone hacker in a hoodie. It’s an entire criminal industry complete with developers, brokers, and money launderers working together like a dark tech startup. And while these groups constantly evolve, so do the tools and partnerships aimed at stopping them before they strike. My guest today is Cynthia Kaiser, former Deputy Assistant Director of the FBI’s Cyber Division and now the Head of the Ransomware Research Center at Halcyon. After two decades investigating global cyber threats and briefing top government leaders, she’s now focused on prevention and building...
info_outlineEasy Prey
Criminals are always adapting. Whether it’s copper wiring stripped from job sites or porch pirates grabbing deliveries in broad daylight, they keep finding new ways to take what isn’t theirs. But maybe prevention isn’t about harsher punishment or more cameras. Maybe it’s about smarter design and understanding what drives people to steal in the first place. My guest today is Dr. Ben Stickle, a professor of criminal justice at Middle Tennessee State University and one of the country’s top researchers on property crime. Before entering academia, he worked in law enforcement, which gives...
info_outlineEasy Prey
Fraud usually gets talked about in numbers like how much money was stolen, how many people were affected, how many cases got filed. But behind every one of those numbers is a person who’s been blindsided, manipulated, or left trying to rebuild trust in others and in themselves. This episode shifts the focus back to those human stories and the fight to protect them. My guest, Freddie Massimi, has spent more than a decade helping scam victims find both financial and emotional recovery, bringing empathy and understanding to a field that too often feels cold and procedural. As a certified...
info_outlineEasy Prey
You think you’d never fall for a scam until you meet someone like Kitboga. He’s a software engineer who’s turned his curiosity about online fraud into a full-time mission to outsmart scammers and protect the people they target. His YouTube channel, The Kitboga Show, has millions of followers and nearly a billion views, thanks to his mix of humor, empathy, and clever ways of exposing how scams really work. In our conversation, Kit opens up about how this all started, what it’s really like to spend hours pretending to be a scam victim, and how organized crime has turned fraud into a...
info_outlineEasy Prey
Everywhere you turn, someone’s trying to fake something like an image, a voice, or even an entire identity. With AI tools now in almost anyone’s hands, it takes minutes, not days, to create a convincing fake. That’s changed the game for both sides. The fraudsters have new weapons, and the rest of us are scrambling to keep up. The real question now isn’t just how to stop scams, but how to know who or what to trust online. My guest today, Bala Kumar, spends his days on the front lines of that battle. He’s the Chief Product and Technology Officer at Jumio, a company working to make...
info_outlineEasy Prey
Kids spend more time online than ever, and for the most part it feels normal. They’re gaming, watching videos, and chatting with friends. But hidden in those same spaces are adults who know how to pose as kids, build trust, and push conversations into dangerous territory. Parents might think it couldn’t happen to their child, yet detectives see how quickly an “innocent” interaction can turn into grooming or extortion. That’s the world Detective Seth Cockerham works in every day. He’s been in law enforcement in Texas for close to a decade, and the last few years have been dedicated...
info_outlineEasy Prey
Some people are willing to hand over their identities for cash, while organized fraudsters are lining up to buy them. What used to be a matter of stolen credit cards has turned into a global marketplace where personal details fuel large-scale fraud. Now with AI, automation, and deepfakes making impersonation easier than ever, it’s becoming much more difficult to protect identities. To understand how we got here and what can be done, I spoke with Ofer Friedman, Chief Business Development Officer at AU10TIX. Ofer has spent more than 15 years in the identity verification and compliance...
info_outlineEasy Prey
Technology is moving faster than our ability to process its impact, forcing us to question trust, motivation, and the value of our time. Few people have had a closer view of those shifts than Esther Dyson. With a background in economics from Harvard, Esther built a career as a journalist, author, commentator, investor, and philanthropist, with a unique ability to spot patterns across industries and challenge assumptions before they become mainstream. She is the executive founder of Wellville, a ten-year nonprofit project dedicated to improving equitable well-being in communities across the...
info_outlineEasy Prey
Cybercrime continues to evolve in sophistication and scale, with attackers running their operations much like businesses. From ransomware gangs with customer support desks to AI-generated phishing campaigns that erase traditional red flags, scams are becoming harder to detect and stop. In this episode, David Bittner, host of the CyberWire Daily Podcast, shares his perspective on the changing landscape of fraud and cyberattacks. Drawing on his background in media, theater, and podcasting, as well as years of reporting on security issues, he explains how both criminals and defenders are using...
info_outlineEasy Prey
Cybercriminals are accelerating their attacks in ways that weren’t possible a few years ago. Artificial intelligence is giving them the ability to spin up phishing campaigns, voice clones, and deepfakes in minutes instead of days. As a result, the gap between what’s genuine and what’s fake is closing fast, making it harder for both individuals and organizations to defend themselves. I’m thrilled to welcome Brett Winterford, Vice President of Okta Threat Intelligence. Brett has had a front row seat to these changes. His team analyzes identity-based attacks and delivers insights to help...
info_outlineCybercriminals are accelerating their attacks in ways that weren’t possible a few years ago. Artificial intelligence is giving them the ability to spin up phishing campaigns, voice clones, and deepfakes in minutes instead of days. As a result, the gap between what’s genuine and what’s fake is closing fast, making it harder for both individuals and organizations to defend themselves.
I’m thrilled to welcome Brett Winterford, Vice President of Okta Threat Intelligence. Brett has had a front row seat to these changes. His team analyzes identity-based attacks and delivers insights to help organizations adapt their defenses. Brett previously served as Okta’s Regional CISO for Asia-Pacific and Japan and started his career as a journalist covering information security before moving into leadership roles in banking, government, and technology.
In this episode, Brett explains how AI is reshaping the speed and scale of cybercrime, why trusted platforms like email, SMS, and collaboration tools are being targeted, and what practical steps can reduce risk. He highlights the growing importance of phishing-resistant authentication methods like passkeys, the need for clearer communication between service providers and users, and the role of collaboration across industries and law enforcement in pushing back against attackers.
Show Notes:
- [00:00] Brett Winterford introduces himself as Vice President of Okta Threat Intelligence and explains how identity-based threats are monitored.
- [02:00] He shares his career path from cybersecurity journalist to CISO roles and now to leading threat intelligence.
- [05:48] Brett compares phishing campaigns of a decade ago with today’s AI-driven ability to launch attacks in minutes.
- [08:00] He notes how reconnaissance and lure creation have become easier with artificial intelligence.
- [10:40] Brett describes the shift from banking malware to generic infostealers that sell stolen credentials.
- [12:30] He explains how cryptocurrency changed the targeting of attacks by offering higher payouts.
- [14:21] We learn about the Poison Seed campaign that used compromised bulk email accounts to spread phishing.
- [15:26] Brett highlights the rise of SMS and other trusted communication channels as phishing delivery methods.
- [16:04] He explains how attackers exploit platforms like Microsoft Teams and Slack to bypass traditional defenses.
- [18:30] Brett details a Slack-based campaign where attackers impersonated a CEO and smuggled phishing links.
- [22:41] He warns that generative AI has erased many of the old “red flags” that once signaled a scam.
- [23:01] Brett advises consumers to focus on top-level domains, official apps, and intent of requests to detect phishing.
- [26:06] He stresses why organizations should adopt passkeys, even though adoption can be challenging.
- [27:22] Brett points out that passkeys offer faster, more secure logins compared to traditional passwords.
- [28:31] He explains how attackers increasingly rely on SMS, WhatsApp, and social platforms instead of email.
- [31:00] Brett discusses voice cloning scams targeting both individuals and corporate staff.
- [32:30] He warns about deepfake video being used in fraud schemes, including North Korean IT worker scams.
- [34:59] Brett explains why traditional media-specific red flags are less useful and critical thinking is essential.
- [37:15] He emphasizes the need for service providers to create trusted communication channels for verification.
- [39:29] Brett talks about the difficulty of convincing users to reset credentials during real incidents.
- [41:00] He reflects on how attackers adapt quickly and why organizations must raise the cost of attacks.
- [44:18] Brett highlights the importance of cross-industry collaboration with groups like Interpol and Europol.
- [45:24] He directs listeners to Okta’s newsroom for resources on threat intelligence and recent campaigns.
- [47:00] Brett advises consumers to experiment with passkeys and use official apps to reduce risk.
- [48:00] He closes by stressing the importance of having a trusted, in-app channel for security communications.
Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.