Infosecurity Magazine Podcast

Beyond Bug Bounties: How Private Researchers Are Taking Down Ransomware Operations

November 4, 2025·33 min
Episode Description from the Publisher

Just in time for spooky season, this episode takes you into the darkest corners of the cyber underworld, where the real monsters aren’t ghosts or goblins, but ransomware gangs lurking in the shadows. We sat down with Matthew Maynard (3.42), a cybersecurity pro by day and a real-life cyber ghostbuster by night, who doesn’t just hunt vulnerabilities, but haunts the hackers themselves. While most bug bounty programs reward researchers for finding flaws, Matthew’s work is far more chilling (and thrilling). As part of threat intelligence programs like Halcyon’s Threat Research Intelligence Program (TRIP), he infiltrates ransomware gangs, extracts their secrets and helps shut down their operations before they strike. For CISOs and executives, Matthew’s experience offers a rare and critical perspective on how to shift from reactive fire-drills to proactive threat hunting. By leveraging dark web intelligence, undercover engagements, and threat actor profiling, security leaders can anticipate attacks, disrupt criminal operations, and even recover stolen data before it’s too late.

Podzilla Summary coming soon

Sign up to get notified when the full AI-powered summary is ready.

Get Free Summaries →

Free forever for up to 3 podcasts. No credit card required.

Listen to This Episode

Get summaries like this every morning.

Free AI-powered recaps of Infosecurity Magazine Podcast and your other favorite podcasts, delivered to your inbox.

Get Free Summaries →

Free forever for up to 3 podcasts. No credit card required.