CyberWire Daily - Hot sauce and hot takes: An Only Malware in the Building special. [OMITB]
Episode Date: September 2, 2025Welcome in! You’ve entered, Only Malware in the Building — but this time, it’s not just another episode. This is a special edition you won’t want to miss. For the first time, our hosts are to...gether in-studio — and they’re turning up the heat. Literally. Join Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED, along with N2K Networks Dave Bittner and Keith Mularski, former FBI cybercrime investigator and now Chief Global Ambassador at Qintel, as they take on a fiery hot wings challenge while answering personal questions about themselves, their careers, and the stories that shaped them. Think you’ve seen them tackle malware mysteries before? Wait until you see them sweat. This one’s too good for audio alone — you’ll want to watch the full video edition to catch every spicy reaction, every laugh, and maybe even a few tears. So grab your milk, get ready to feel the burn, and come join us for this special hot take on Only Malware in the Building. Learn more about your ad choices. Visit megaphone.fm/adchoices
Transcript
Discussion (0)
You're listening to the Cyberwire Network, powered by N2K.
Hey, folks, Dave here.
If you want to watch this episode, well, you can check it out on our YouTube channel
by going to YouTube.com slash at N2K Cyber.
Enjoy the show.
Why could we not have done the thing where they bake cupcakes?
Oh, my God.
So from N2K CyberWire, I'm Keith Milarski, Chief Global Ambassador at Q&Tel,
in retired former FBI agent turned cyber host, and today, your interrogation lead.
Welcome to a special heat-infused edition of Only Mailware in the Building,
where we're combining digital forensics with hot sauce tactics.
Today, I'll be grilling, not just the wings, but our guests,
as we turn up the heat, spice, and the scrutiny.
The questions get hotter as the sauces do.
And by the end, we might uncover some truce
our guests didn't see coming.
You ready, Dave?
No.
Joining me at the table or two of our very own,
Dave Bittner, host of the CyberWired Daily,
hacking humans, caveat,
and probably the most familiar voice
in cybersecurity podcasts.
And Selena Larson,
senior threat researcher at ProofPoint,
expert in cybercrime,
and a true hunter of the Internet's most elusive adversaries.
Wow.
I know.
And a hunter of hot dogs.
And a hunter of hot dogs.
I love a good hot dog.
So we're going to start off just with a question in one that has no heat.
So this is literally a softball.
This is our baseline to establish what no heat is like.
What no heat is like.
Okay, so this is for me.
The only heat, yes.
Okay.
The only heat coming is the question.
All right, I'm ready.
All right.
So this shouldn't be any problem at all.
Oh, my gosh.
That's delicious.
All right.
That's pretty good.
It's quite tasty.
No sauce.
Scoval Zero.
So let's take a trip down memory lane.
What was the first password you ever used?
Was it something super basic like password one, two, three,
or did you come up with something a little more creative?
How have your password habits changed and evolved since?
And be honest, do you still use the same passwords?
It might take you longer to remember this.
Go ahead, yeah, because it was longer ago.
Yeah, you have more time to think.
Go for it.
My first password, I think, was probably like my last name.
I was very young on the internet coming up using AOL instant messenger and logging on
to our little home computer.
I honestly can't even remember really what it was, but it was probably something like that.
But a better fun fact is my first AIM screen name, which was P-I-T-A and then my name.
which stood for pain in the posterior.
Posterior, yes.
So I still remember that very clearly, not my password though,
but yes, definitely my password uses have changed.
Do not use the same password as then or anywhere.
And not that you admit it here in front of all of the listeners.
Not in front of all of the audience, that's for sure.
But of course, no, it's gotten a lot better.
Password managers, multi-backer authentication.
Definitely not using that when I was a little teeny bopper.
Bopper on my big bubble back.
Well, I mean, I started with TRS 80 back in about 1980.
Did they even have passwords then?
Well, no, the computers didn't.
I mean, you press the button and the computer came on.
There was no booting, there was no, you know.
But we had dial-up modems, 300-bog dial-up modems,
and we dialed into bulletin board systems.
I don't know if you ever did any of that.
Yeah, I did, yeah.
BBS.
BBS.
So I wanted it, one user at a time, you know.
So it was great.
It was fun.
My first, I remember my first username was the highly original and clever Ziggy Stardust.
Ah, yes.
That was you?
That was me.
But I don't remember, on my password, I don't remember what my original password.
It was probably something like appropriate for an 11 or 12-year-old boy.
It was probably something like, you know, Bowie's 60.
69.
69, dudes!
I don't, but I do not still use that.
Mine I remember vividly, so I remember going to the library and opening my first hotmail account.
So I, this before I had my first internet computer at home.
And in my first password, I was a big beetle fan.
I still am, but it was 28 if, which was on the license plate on the Abbey Road.
So it was, it was, so I had a combination of,
both letters and numbers in that.
So that was a deep cut.
Yes, it was.
That's pretty clever.
Sauce number one, hacked and hot.
Scoville, 1,200.
All right, here we go.
This is good.
Okay.
Mm-hmm.
Okay, that's not, I can feel some heat coming.
It's building, for sure.
There's more coming, not, but manageable.
This is something I would expect in a,
like an authentic restaurant, you know,
like where they warn you that this is not actually
for the Americans.
It's a little, that's hotter than I expected.
The heat is coming now.
The aftertaste, it packs an after punch.
And I'm worried because that was the-
That was number one.
As a cybersecurity expert, what is your personal tech
routine like when you wake up in the morning, do you go straight to checking if you've
been hacked or do you start with a fresh cup of coffee? Is there any kind of ritual you have to make
to make sure your digital life stays secure? That's a good question. I have an unhealthy
addiction to my smartphone and my computer, so I immediately look at my phone as soon as I wake up
my alarm clock and I look at it. But this is actually an interesting question because I feel like
it's fundamentally about threat modeling, right?
And we're thinking about how do you use technology?
How do we use technology?
Are we always checking to see, you know, like, what is our risk level?
And for us, I mean, I don't know how you feel, Dave, but I feel sort of, I'm very public.
I'm out there.
Oh, I'm out there.
I am imminently findable.
Yeah, yeah, yeah, yeah.
On the Internet.
Yeah.
And so I do kind of think that I'm a little bit more cautious about some of the stuff that I would post of, like, oh, where am I?
What am I doing?
And, you know, making sure that I do have all those things under control.
But more importantly, I also talk to people who know me, who are my friends and family
and make sure that they are also very secure.
Because for public people, it can, you know, kind of be a little bit of a supply chain,
I guess, your best is, you know?
Some collateral damage, so to speak.
Exactly, exactly.
But yeah, same thing.
My phone is what wakes me up in the morning.
So I'm on an iPhone.
So the first thing it does is tell me everything, you know,
hey, good morning.
And I have my nickname and my phone is Your Majesty.
So it says, good morning, Your Majesty.
Here's the weather and here's what it's going to be, right?
I follow the very similar routine that you guys do as well.
The one thing I do do is always checking my bank account in my credit cards for, you know,
because it's not necessarily that they're going to hack my passwords that are going to, you know,
and come into my accounts, but they may hack some.
somebody where by credit card or something has been, so I'm always looking for those fraudulent
charges, especially when I'm traveling overseas, because you never know whether there's a skimmer
there or something like that. So I'm very hypervigilant on that. That's a great point, actually.
And then also using, you know, two-factor authentication. So even if they would get one of our
passwords, just, you know, you don't have to worry. It's going to be much more difficult to get in.
Sauce number two, threat levels.
Scoval 26,500.
Let's do it.
Let's give it a shot.
Down one, two, three.
Mm-hmm.
Could taste.
Mm-hmm.
Time on time.
That level, delicious.
Yeah, two thumbs up.
I think that was the best tasting one so far on that.
I am sweating a little.
You are a little, yes.
Thanks.
All right, so as a cybersecurity pro,
you're clearly about protecting yourself from malware.
But have you ever had a moment where malware almost got you?
Maybe an email attachment or a shady website that you almost clicked on,
and how close did you come to a digital disaster?
I got God.
Yeah?
Yeah.
I think we all have.
Yeah.
So for me, it was the classic,
I got a text message from a good friend.
that said, hey Dave, did you see this video that was posted of you?
Oh no.
That's all that said.
Yep.
And I was like, no.
I got to see what this is.
Right, I got to see what this is.
So I click through and it takes me to like a Facebook login page.
And I logged in.
Yeah.
That was it.
That was the ball game.
And so you got your Facebook hacked.
I did.
Yeah.
I got it back.
This is probably, this may have been 10 years ago.
So I was a lot less vigilant back then,
but at the same time, you know,
I just, I fell for it, hook, line, and sinker.
They got me, got my ego, my curiosity,
my fear of what could the, what video could this be?
Yeah.
And now also, because it came from a trusted source.
So it was my friend who got hacked,
and then they were spamming everybody on their,
on their, you know, directory, their list of friends.
Yeah, that was one of the big techniques to do that.
So, because now you think it's safe, it's coming,
That's like my sister will send me stuff.
I will never click on a link that she sends me anything.
And I'll call her up, I'll be like, hey, did you just send me something?
I want to, I'm not clicking on anything until you tell me it's safe.
Yeah, yeah, that's a good trick though.
But did anything happen?
No, I mean, I realized it quickly enough that I was able to salvage it and I, so I didn't
actually end up losing anything.
I did feel pretty stupid though.
Well, so I think it's really important because, to your point, everyone has, has something
that they could fall for.
And we as cyber security practitioners
have experienced something that might be bad or whatever.
But I think the most important thing
that people need to do is not feel stupid.
Yes.
Because that is, you know, part of the hack
is making you feel stupid.
They prey on your brain.
They're like are going after you emotionally.
They're trying to hack your feelings.
And you're, you know, like you were saying,
it played to your ego and your interest.
And you're like, I want to see this video of me.
And so I think that that's so important
because that is, they tailor it to make you feel bad.
My almost getting got, I don't think I, as far as I know, have never, like, fully been hacked.
But scammers will oftentimes register phone numbers.
It's like one letter or one number off of a real phone number.
And so I was trying to book a flight.
And I was calling the airline.
And I called the airline, but I mistyped the number.
And so I was like one number off.
It wasn't even clicking on it or wasn't like an attack that says,
call this number to dispute it or whatever.
I literally just mis-typed it.
And then I call and whatever,
and it went through the whole answering machine
and, like, this is the airlines
and put in your information,
put in your date of birth,
put in your, all of this stuff.
And then there was one thing that they had asked for
that I was like, okay, this is weird.
But yeah, but I, and then I just started putting in fake information.
So I was like, oh, I want to see where this is going.
You're not getting this.
Yeah, but then I said it was like,
put in your passport information,
put in your credit card information.
And so, like, put in all the things
that are like numbers
that you can sort of like type in to get information.
And it was all like automated.
I was like, wow, this is actually pretty good.
Like, it could have got me.
When I was working undercover, my job on the forum
was to review any new malware packages that came out.
And they really thought that somebody on my site was a Fed.
So five people.
And they were right.
They were right.
They were right.
And so what they did was at that time,
there was like the control panel for the malware.
And they backdoored it.
So when it came in to get reviewed,
Even though we took it off on like a, you know, like a, not on a production network, you know, on like a research network, and it was backstopped and everything like that, as soon as we executed the file, everything that was on the flash drive, which the analyst had some other things on the flash drive that were like templates of the NCFTA where I was stationed and it went right back to the bad guys.
So, yeah, so there was like a little bit of a melancholy moment there
where, you know, now all of a sudden they knew somebody worked at the NCFTA.
So we, at that time, we had it backstop to a company and all that.
And then we heard a story that they were going to do this expose
that one of the admins worked at the NCFTA and, you know,
and I thought I was toast.
But then what we ended up doing, we made some phone calls and we scrubbed the DNS,
We scrubbed to who is, so when they did their expose,
none of that stuff existed anymore.
And then they were just like NCFTA template reports.
And like the other hackers were like,
this is all made up because nobody would have these,
you know, these documents there with hypos in it
and things like that, because they were just, you know,
templates and all that.
So I was able to actually skate by,
Wow.
But that was probably the worst hack because that was my identity, you know,
And that was my, you know, my undercover identity, but we were able to make it through it.
So patched it up and is that something that's commonly done in these forums is they'll sort of seed backdoor.
Oh, yeah.
Yeah, because that's the other, you know, they're always worried about, you know, are there feds or cops there on the forum?
So they're always trying to docks people.
And so I wouldn't trust anything, like a credit card checker or anything.
like I would always make sure you're open, you know, any undercover guys out there,
make sure you're opening up, yeah.
Or researchers, make sure you're opening it up in, you know, in a VM and a totally
non-attributable network because they're going to backdoor it for sure.
We'll be right back.
And now a word from our sponsor, Threat Locker, the powerful Zero Trust Enterprise Solutions,
that stops ransomware in its tracks.
Threat Locker Protect is the core threat locker product focused on endpoint security,
designed to prevent unauthorized software from running,
control how applications interact, and manage access to storage devices.
Its building blocks are allow listing, ring fencing, and network control.
Allow listing is a deny-by-default software that makes application control simple and fast.
Ring fencing is an application containment strategy.
ensuring apps can only access the system resources they truly need to function.
Network control locks down access by port, source IP, or dynamically with ACLs,
that automatically update as IP addresses change.
Shut out cybercriminals with world-class endpoint protection from Threat Locker.
And we thank Threat Locker for sponsoring only malware in the building.
Sauce number three, Scorchware, Scoble Units, 131,000.
Right.
Mm.
Mm.
Oh, there it is.
Yeah, a little bit there.
Starting.
So, given your line of work, how often do you take a break from all things cyber?
things cyber. Now it's hitting me.
Yes.
Do you ever go on a digital detox or is it just impossible to turn off with so much going
on in the cybersecurity world?
And what is your strategy for really finding balance between staying on top of threats and
taking a breather from your screens?
Yeah. So I would say any person who works in this industry who says they know everything
about everything is lying to you.
You know, I'm something of a scientist myself.
Who can rhapsodize on things and, you know, can talk about everything and anything from fraud to, you know, botnets, to APT malware, to nation-state politics, to all these things, that's impossible.
Like, one single person cannot stay on top of everything in cybersecurity.
And I, for me, I have to be very mindful about the things that I can control and I know impact me in my job.
And the things that are interesting to me, but I know that I don't feel responsibility.
to be aware of what's happening because other people know way more about this than I do.
And so for me, I really want to make sure that I'm staying on top of the stuff that I need to know about
and then listen to podcasts like the Cyberwire for the stuff that I could, you know,
it's interesting to me, but maybe not necessarily impacting my work.
But from a digital detox perspective, I do think it's very, because burnout in cybersecurity is so real.
It's so prevalent.
And I think that we are all under a lot of pressure,
whether you work deeper or IT Help Desk or, you know, threat research.
And so malware reversing, taking stuff from the dark web
and downloading it.
And so I do try and kind of go off a little, you know, less crazy on my phone and stuff.
But I read a lot of physical books.
I love physical books because I do need a brain break.
And I get my nails on a lot.
And that takes a while.
So I put my phone away, my computer away.
and I don't, like, that's my, that's my self-care of trying to figure out ways of not being around the screen.
Yeah, yeah.
My scalp is sweating.
Yes, I was going to say.
My nose is running.
Okay, so the question was detox.
Yes.
Okay.
What you're going to need after this.
Yes.
Absolutely.
So, you know, we joke around the office sometimes that, like, my job is, hi, I'm Dave Bittner, and here's today's bad news.
news, you know, and so, and that can get to you after a while. And so my job, I'm spending
a good part of my day hunting down the bad news and trying to decide, you know, trying to rank
them, like what are the, because we do about 10 stories a day on each cyberwire podcast. So
what are the most important 10 stories they're going to benefit our audience the most to know
about? So I have to do that. But I think to your point, it's a really good one that I cannot
be an expert on most of this stuff and so I rely on people like you you know I
know who have specialties so I may not know the answer to something but I know
who does and so building those relationships and being able to call somebody up
and ask them what does this mean you know I've done that with actually I've done
that with both of you yeah so no how do you decompress I don't
Listen to David Bowie.
When I'm starting to feel it that I need some time off, I need to respect that.
And even just sometimes taking a single day to do nothing, to go, you know, walk to go to a state park and hike or stay away.
Like you said, put the phone down and just try to breathe and change my space and my mindset and all that kind of stuff.
And I think like you were mentioned in our industry, especially doing, you know, GFIR, you're.
It's just pressure.
And, you know, one of the things I always told, you know, my agents working for me,
the people that work for me in EY, was that you can't, you could run a marathon or you can run a sprint.
You can't sprint a marathon.
And it's really important to really kind of pace yourself because otherwise you'll burn out very quick.
And it's also like when, like if you're lifting weights, if you lift weights every day, you don't make gains.
You need time to let those muscles grow.
And it's a lot like that in our industry, I think,
that we just put a lot of pressure on ourselves
because everything is a five-alarm fire, you know, not just these wings.
You know, so it's really important for that.
So some of the things that I try to do is, one is I don't bring a phone or a tablet in my bedroom.
So it's like, so this way I go up there and I sleep and, you know,
I don't have a TV in there.
So it's just total decompression.
And when I go on vacations, I like to go on cruises because you turn your phone off
because the Wi-Fi on the cruise is just crazy expensive.
My glasses are steaming up.
Well, before we do this next one, I'm going to put, I have to put my hair up.
It's getting hot.
Oh, is it?
It's time.
Oh, I see.
It's time.
Okay, very good, very good.
It's an extra layer that I don't need.
Sauce number four.
Only Maruga in the building.
Scoval, one million.
Oh.
Oh.
Oh.
What does that mean?
It's a pepper.
It's a very, very spicy pepper.
I can't.
Is it the scorpion pepper?
Is that a separate one?
I don't know if the moruga is the scorpion pepper.
Okay.
It's a very spicy pepper.
I've never had a maruga pepper.
And so this would be interesting.
Oh, we have to put extra on it?
Yeah, just a little dab.
Oh, my gosh.
Well, that was a lot.
So you probably don't have to do that much, but accidentally overboard.
I'm a dab off.
No.
Yeah, you can dab off by dab.
Oh, look at that.
All right.
All right, okay.
Wait.
Only Maruga in the building.
Oh.
All right.
All right.
Down the hedge.
Cheers.
Cheers.
Cheers.
Cheers, cheers.
All right.
Three, two, one.
Mmm.
Mm.
Very good taste.
Yeah.
That's good.
Mm-hmm.
I'm waiting for it to hit.
Okay.
Yeah.
Not bad.
It's coming.
Yeah, I can tell.
Yeah, I can tell.
It's building.
It's just a question of how much and how long.
It's a, it's a.
Oh, there it is.
There it is.
Oh, this one, yeah, this one did the longest.
Yeah.
It's a little.
And now that it's there, it's staying.
Oh, wow.
Okay.
All right.
Why could we not have done the thing where they bake cupcakes?
Now, now it's.
Oh, my God.
The taste is good, but it's hot.
It is.
Okay.
It's hot.
Do we have a couple more...
Billion breathing fire.
Do we have a couple more nuggets?
Because I'm not quite done, Mr. Polarski.
Okay.
Oh no, not the FBI hat.
Ah!
Oh, no.
The tables are turned and I'll be asking the questions now.
Oh, right.
Mr. Interrogator.
Oh, my gosh.
Oh, my gosh.
Oh, look at this.
You're representing.
Yes.
All right.
In my previous career, I actually did some work with the FBI.
Oh, I did not want to do that.
We have another napkin.
Did you touch your eyes?
Maybe.
Oh my god, my eyes are watery.
Okay.
It's good.
I'm so glad we're not doing 10 of these.
Yeah.
Oh, thank you.
I am going to sweat through this hat.
All right.
All right.
So, Keith.
Yes.
Wait, do we need another nuggets?
Yes.
But I'm trying to move this along, so you know.
Drink, drink, drink.
All right. I'm ready, Dave.
All right, we're going to do one more round.
Okay.
With the really hot stuff.
Of the real hot stuff.
Yes.
Wow.
We can't go back.
I love it.
I love it.
No, this is great.
This is wonderful.
This is awful.
All right.
Oh, good God.
All right.
I'm ready.
I'm ready.
I'll do a little more.
This hurts.
so bad.
Uh-huh.
Get it all there.
Yeah.
And not like a John Cougar song where it's hurt so good.
No, no, no.
This is unpleasant.
This is really unpleasant.
Okay.
Hey, Dave, why don't you be a podcaster?
That'd be fun.
Oh, yeah.
We'll make funny videos and we'll have a good time.
That sounds like a great career.
All right.
It's flashing before your eyes.
I know.
Well, lots of things are.
All right.
Three, two, one.
Cheers.
Cheers.
Yeah.
Okay.
So.
So.
G, man.
In your career with the FBI, in all your years of hunting down bad guys, what was the craziest thing you ever saw?
What was the wildest thing that made you step back and go, is this, could this possibly be real with these numb skulls that I'm chasing around the world?
Okay, I'm taking this hat off because, oh, I'm going to eat this first one.
There's one extra.
There's one left.
Dull things.
I know there were some crazy personalities.
Wasn't there a guy with the cats?
There were guys with cats.
Like exotic cats, right?
Yeah, so that was Bogachev, the game over Zeus.
Oh, yeah.
So he was very unique in that, you know, he had these exotic cats.
Was it like a lynx or like a...
Yeah, yeah.
It was like, yeah.
Like, links or like a bobcat.
A bobcat, there we were.
you know he had uh thank you thank you so much uh yeah yeah so i'm going slow in this dave
yeah well how's your brain yeah it's it's going good yeah my eyes have stopped watering
so uh yeah i mean i i guess like the the the funniest things is that uh their their wives and
girlfriends always never met a camera that they didn't like so
So we had...
Like me.
Yeah.
So we had a thing like, you know, you've heard in like the intelligence community, you heard
of like UMIT, which is like UMIT intelligence or SIGAN.
And so we had a thing which we called Wagint for WISE and Girlfriends Intelligence.
So, you know, just seeing what they would be posting all the time and, you know, just going,
and you just saw crazy stuff, a lot of stuff not safe for work.
So you could just kind of imagine some of those.
but you know they would post where they were which was always great for us
because then you knew what they were doing so yeah so that that's the best I can
come with the clarity of my head right now so how are you I'm good this is great
this is great for me yeah I'm doing better now I'm dying here guys but the
fact that you doubled down and we went for two so so we're gonna talk our
first computers what was the first one you own that you use that sparked your
love for tech. Was it a bulky desktop from the 90s or something else entirely? And then was
there a specific moment when you thought, okay, this is, I'm hooked on tech. So I will enter.
Go ahead.
You have a thing about me. I didn't like technology when I was growing up. I didn't like
it. I like, you know, all millennials had our, you know, MySpace and AIM and everything. And
I like did the marquee scroll so stuff could go across my MySpace page. And I was like, I'm a hacker.
But I didn't really like technology, and I was kind of whatever about it.
I really wanted to be, I was a journalist, so I really wanted to be a journalist, I wanted to be a writer,
wanted to, you know, be a person with that does words and not numbers.
And then I went to San Francisco, and I was doing a job interview in San Francisco,
and they're like, well, it was for technology reporter jobs, and it was like, well, you know,
what do you know about, or like, what do you know about technology?
And I'm like, nothing.
But you know what I do know about the news?
And in San Francisco, technology is the news.
And so I very quickly became, got up, caught up to speed.
And then I was like, wow, I let it.
And then I really like cybersecurity and privacy.
And so I was like, I'm almost entirely self-pought.
I haven't really, I've done some trainings, but not a ton.
But now I love it.
But now I love it.
But my first computer was the, like, bubble Mac.
Okay, yeah.
I think it was a teal, like the teal bubble Mac.
I had to share it with my siblings.
Look at a Mac.
Yeah, yeah.
Yeah, we had designated, like,
you know times and things you could do and and I think I just had just missed that you
can't use the phone and the computer at the same time yeah my sister had that but
then I had them oh we had to know what about you did I'm sorry I didn't hear a
single word you just saw the first time I laid hands on computers was I went to like a
They had like a special summer camp, summer school kind of thing.
And they had TRS80 Model 1s, which are like some of the original 8-bit computers.
So that's where I learned how to like program basic.
And I loved it.
I loved it so much.
So then I saved up money because I had a paper route.
And I bought a TRS-80 color computer.
Yeah.
I could hook up to a cheap TV and I had a cassette recorder and all that original stuff.
And you know, the thing is when you're 11 or 12, like you don't have any money.
But the thing you have is time.
Yeah.
So I would spend all summer long just like all night, you know, whatever.
And I programmed all my own stuff and eventually got a modem.
And that opened up a whole other world of phone freaking and...
You were a freaker?
I was.
Wow.
Love it.
Did you freak?
I did not.
Yeah.
I did not.
I got into it a little bit later when I got into college.
So, you know, they had these Apple computers, you know, at college.
So you kind of got into that and just...
started out with, I wanted something easier than a typewriter to type my stuff, and then
it kind of went from there. And then one of my roommates would always play on a computer,
you know, you'd play like Leisure Suit Larry or, you know, things like that. You know, so just kind
of go in and from the games. And then finally, you know, when Windows 95 came out with the Start
Me Up campaign, that's kind of when I got that first internet computer, which was a gateway
computer back in those days. And I think, I can't even remember.
I remember like the hard drive was probably like two gigabytes, maybe three gigabytes, something like that.
And you had that, you know, very fast, 28-bit modem, dial-up, you know, which was crazy.
And then, you know, when I was at the FBI, I did more, like, offensive stuff.
So, because I worked counterintelligence and espionage for my first seven years.
And then I was like, well, this Internet thing I don't think is going to be a fad.
You know, I think it's not going to go away.
So I transferred over to Cyber Division.
And then I had a really great, I was like you, I wasn't formally trained,
but I had a great agent.
His name was Tom Grasso, and he was kind of like my Yoda, you know,
that he just could take time and would show me how to do everything.
And, you know, from that, it just kind of took off.
Oh, that's great.
Yeah, yeah.
Yeah, and that was, you know, pretty, like, big Internet
where everything is just accessible at any time.
Right.
And so you're just kind of curious as like, you know, what is going on over in East Germany?
What is going on in just, you know, even in the UK,
It's just a lot different for sure.
Yeah.
Well, all right.
Dave, Selena, we just took on the wings of death,
and now there's nothing left here.
Nothing to do right now, but to just roll out the red carpet
for this camera, this camera, and this camera.
Yeah.
I'm good.
Yeah.
Yeah, and I also let's look.
I would invite all of our listeners.
Yes, please.
First of all, first of all,
try some pawn sauce.
It'll make your brain rattle.
And you'll be very happy
and tell some fun stories with your friends.
But more importantly,
tune in wherever you get your podcast
to Only Mower in the building.
N2K Network, Cyberwire,
the great cast and crew here.
Actually in the building,
only crew in the building.
Very exciting.
And we've survived.
We survived.
We thrived. We thrived.
Tune in to Only Mower in the building.
Day's not over yet.
Day's not over yet.
All right.
He did it.
That was a blast, guy.
malware in the building. Visit Threatlocker.com.