1. EachPod
EachPod
Hacking Humans - Podcast

Hacking Humans

Deception, influence, and social engineering in the world of cyber crime.

Technology Tech News News
Update frequency
every 3 days
Average duration
26 minutes
Episodes
696
Years Active
2018 - 2025
Share to:
Scamming the innocent.

Scamming the innocent.

This week we are joined by Maria Varmazis, host of the N2K daily space show, T-Minus. She brings us a scary story from a woman who never thought she'd ever be scammed. Dave and Joe shares some follow…
00:47:00  |   Thu 22 Feb 2024
Encore: smishing (SMS phishing) (noun) [Word Notes]

Encore: smishing (SMS phishing) (noun) [Word Notes]

From the intrusion kill-chain model, the delivery of a “lure” via a text message to a potential victim by pretending to be some trustworthy person or organization in order to trick the victim into re…
00:04:37  |   Tue 20 Feb 2024
Looking forward in 2024.

Looking forward in 2024.

Aaron Walton, Threat Intel Analyst from Expel is discussing some things to look out for in 2024. Joe and Dave share some listener follow up from Mateusz, who shares some positive news with us. Dave's…
00:42:42  |   Thu 15 Feb 2024
Encore: port mirroring (noun) [Word Notes]

Encore: port mirroring (noun) [Word Notes]

A network switch configuration setting that forwards a copy of each incoming and outgoing packet to a third switch port. Also known as SPAN or Switched Port Analyzer, RAP or Roving Analysis Port, and…
00:04:37  |   Tue 13 Feb 2024
Scamming just isn't what it used to be.

Scamming just isn't what it used to be.

This week, we are joined by host of N2K's T-Minus Space Daily podcast, Maria Varmazis, she sits down with Joe and Dave to discuss sextorion materials that were found on popular social media apps such…
00:47:37  |   Thu 08 Feb 2024
Encore: Network Time Protocol (NTP) attack (noun) [Word Notes]

Encore: Network Time Protocol (NTP) attack (noun) [Word Notes]

A reflection or amplification distributed denial-of-service attack in which hackers query Internet network time protocol servers, NTP servers for short, for the correct time, but spoof the destinatio…
00:06:37  |   Tue 06 Feb 2024
Quiz scam nightmare.

Quiz scam nightmare.

Jaeson Schultz, Technical Leader from Cisco Talos, is discussing "Spammers abuse Google Forms’ quiz to deliver scams." Dave's story discusses the disturbing new trick up a scammers sleeve to get you…
00:47:27  |   Thu 01 Feb 2024
Encore: smishing (SMS phishing) (noun) [Word Notes]

Encore: smishing (SMS phishing) (noun) [Word Notes]

From the intrusion kill-chain model, the delivery of a “lure” via a text message to a potential victim by pretending to be some trustworthy person or organization in order to trick the victim into re…
00:04:37  |   Tue 30 Jan 2024
Phishing for mail.

Phishing for mail.

Abhilash Garimella from Bolster joins to discuss a USPS phishing campaign abusing freemium dynamic DNS and SaaS providers. Dave and Joe share some follow up, one was from listener Mike who wrote in t…
00:52:26  |   Thu 25 Jan 2024
Encore: port mirroring (noun) [Word Notes]

Encore: port mirroring (noun) [Word Notes]

A network switch configuration setting that forwards a copy of each incoming and outgoing packet to a third switch port. Also known as SPAN or Switched Port Analyzer, RAP or Roving Analysis Port, and…
00:04:37  |   Tue 23 Jan 2024
It's the intricate deceptions that get you.

It's the intricate deceptions that get you.

This week we are joined by the host of T-Minus, N2Ks very own Maria Varmazis brings her own story and discusses with Dave and Joe. We start off with Joe, and he brings in the story of Andy Cohen and …
00:38:14  |   Thu 18 Jan 2024
Encore: Network Detection and Response (NDR) (noun) [Word Notes]

Encore: Network Detection and Response (NDR) (noun) [Word Notes]

NDR tools provide anomaly detection and potential attack prevention by collecting telemetry across the entire intrusion kill chain on transactions across the network, between servers, hosts, and clou…
00:06:19  |   Tue 16 Jan 2024
Password Perils: The threat of credential stuffing exploits.

Password Perils: The threat of credential stuffing exploits.

Frank Riccardi sits down to discuss how cybercriminals exploit people’s fondness for reused passwords to launch credential stuffing attacks. Dave and Joe share a bit of follow up, one from a listener…
01:00:15  |   Thu 11 Jan 2024
Encore: shadow IT (noun) [Word Notes]

Encore: shadow IT (noun) [Word Notes]

Technology, software and hardware deployed without explicit organizational approval. In the early days of the computer era from the 1980s through the 2000s security and information system practitione…
00:04:54  |   Tue 09 Jan 2024
The DNA dilemma: Unraveling a 23AndMe breach.

The DNA dilemma: Unraveling a 23AndMe breach.

Alethe Denis from Bishop Fox is talking with Dave and Joe with her take on the 23AndMe breach. Dave and Joe share some follow up from listener Michael, who writes in to share thoughts on our catch of…
00:49:07  |   Thu 04 Jan 2024
Stolen personality?

Stolen personality?

Matt Lewis from the NCC Group joins to discuss how cybercriminals can decode your personality through AI conversations to launch targeted attacks at you. Dave and Joe share some follow up from listen…
00:45:21  |   Thu 28 Dec 2023
The grinch who hacked Christmas. [Hacking humans goes to the movies]

The grinch who hacked Christmas. [Hacking humans goes to the movies]

Thanks for joining us again for another episode of a fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joine…
00:33:12  |   Sun 24 Dec 2023
Reeling in some phishing trends.

Reeling in some phishing trends.

Adam Bateman, Co-Founder & CEO at Push Security, is sharing some of the latest phishing trends his team has been observing. Dave and Joe share some listener follow up from Michael, who writes in with…
00:55:28  |   Thu 21 Dec 2023
chaos engineering (noun) [Word Notes]

chaos engineering (noun) [Word Notes]

The resilience discipline of controlled stress test experimentation in continuous integration/continuous delivery environments, CI/CD environments, to uncover systemic weaknesses. CyberWire Glossary …
00:10:31  |   Tue 19 Dec 2023
Shielding your inbox.

Shielding your inbox.

Seth Blank, CTO of Valimail, joins to discuss the implications on email security on behalf of DMARC. Joe and Dave share some follow up regarding Meta, who is the parent company to Facebook and Instag…
00:53:19  |   Thu 14 Dec 2023
Disclaimer: The podcast and artwork embedded on this page are the property of N2K Networks, Inc.. This content is not affiliated with or endorsed by eachpod.com.