1. EachPod

Hacking Humans - Podcast

Hacking Humans

Deception, influence, and social engineering in the world of cyber crime.

Technology Tech News News
Update frequency
every 3 days
Average duration
26 minutes
Episodes
696
Years Active
2018 - 2025
Share to:
Convinced, compromised, and confirmed.

Convinced, compromised, and confirmed.

This week, our hosts⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠Dave Bittner⁠⁠⁠, ⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are back sharing the l…
00:51:16  |   Thu 10 Jul 2025
adversary group naming (noun) [Word Notes]

adversary group naming (noun) [Word Notes]

Please enjoy this encore of Word Notes. A cyber threat intelligence best practice of assigning arbitrary labels to collections of hacker activity across the intrusion kill chain.
00:10:17  |   Tue 08 Jul 2025
Brushed aside: The subtle scam you didn't order.

Brushed aside: The subtle scam you didn't order.

This week, our hosts⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠Dave Bittner⁠⁠, ⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are back sharing the latest in s…
00:44:00  |   Thu 03 Jul 2025
BSIMM (noun) [Word Notes]

BSIMM (noun) [Word Notes]

Please enjoy this encore of Word Notes. A descriptive model that provides a baseline of observed software security initiatives and activities from a collection of volunteer software development sho…
00:06:09  |   Tue 01 Jul 2025
The RMM protocol: Remote, risky, and ready to strike. [Only Malware in the Building]

The RMM protocol: Remote, risky, and ready to strike. [Only Malware in the Building]

Please enjoy this encore of Only Malware in the Building. Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting t…
00:39:25  |   Tue 01 Jul 2025
The many faces of fraud.

The many faces of fraud.

This week, our hosts⁠⁠⁠⁠⁠⁠⁠ ⁠Dave Bittner⁠, ⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠ Space Daily show) are back sharing the latest in social engi…
00:41:58  |   Thu 26 Jun 2025
OWASP vulnerable and outdated components (noun) [Word Notes]

OWASP vulnerable and outdated components (noun) [Word Notes]

Please enjoy this encore of Word Notes. Software libraries, frameworks, packages, and other components, and their dependencies (third-party code that each component uses) that have inherent securit…
00:08:04  |   Tue 24 Jun 2025
Gold bars and bold lies.

Gold bars and bold lies.

Please enjoy this encore of Hacking Humans. On Hacking Humans, ⁠Dave Bittner⁠, ⁠Joe Carrigan⁠, and ⁠Maria Varmazis⁠ (also host of N2K's daily space podcast, T-Minus), are once again sharing the late…
00:45:57  |   Thu 19 Jun 2025
Managing online security throughout the decades.

Managing online security throughout the decades.

This week, our hosts⁠⁠⁠⁠⁠ Dave Bittner, ⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, …
00:43:09  |   Thu 12 Jun 2025
OWASP software and data integrity failures (noun) [Word Notes]

OWASP software and data integrity failures (noun) [Word Notes]

Please enjoy this encore of Word Notes. Code and data repositories that don't protect against unauthorized changes.
00:08:27  |   Tue 10 Jun 2025
No cameras, no crew—just code.

No cameras, no crew—just code.

This week, our hosts⁠⁠⁠ ⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠, and ⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠T-Minus⁠⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and …
00:46:33  |   Thu 05 Jun 2025
OWASP server-side request forgery (noun) [Word Notes]

OWASP server-side request forgery (noun) [Word Notes]

Please enjoy this encore of Word Notes. An attack technique that leverages an unprotected web server as a proxy for attackers to send commands through to other computers.
00:07:38  |   Tue 03 Jun 2025
The great CoGUI caper. [OMITB]

The great CoGUI caper. [OMITB]

Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is ⁠⁠Selena Larson⁠⁠, ⁠⁠Proofpoint⁠⁠ inte…
00:35:20  |   Tue 03 Jun 2025
Lights, camera, scam!

Lights, camera, scam!

This week, our three hosts ⁠⁠⁠Dave Bittner⁠⁠⁠, ⁠⁠⁠Joe Carrigan⁠⁠⁠, and ⁠⁠⁠Maria Varmazis⁠⁠⁠ (also host of the ⁠⁠⁠T-Minus⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phish…
00:41:49  |   Thu 29 May 2025
OWASP security logging and monitoring failures (noun) [Word Notes]

OWASP security logging and monitoring failures (noun) [Word Notes]

Please enjoy this encore of Word Notes. The absence of telemetry that could help network defenders detect and respond to hostile attempts to compromise a system.
00:06:04  |   Tue 27 May 2025
Scam me once.

Scam me once.

This week, our three hosts ⁠⁠Dave Bittner⁠⁠, ⁠⁠Joe Carrigan⁠⁠, and ⁠⁠Maria Varmazis⁠⁠ (also host of the ⁠⁠T-Minus⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing sche…
00:58:06  |   Thu 22 May 2025
OWASP identification and authentication failures (noun) [Word Notes]

OWASP identification and authentication failures (noun) [Word Notes]

Please enjoy this encore of Word Notes. Ineffectual confirmation of a user's identity or authentication in session management. CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/owasp-ide…
00:05:58  |   Tue 20 May 2025
The band is finally back together.

The band is finally back together.

And....we're back! This week, our three hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are all back to share the latest in social engineering scams, …
00:43:33  |   Thu 15 May 2025
Log4j vulnerability (noun) [Word Notes]

Log4j vulnerability (noun) [Word Notes]

Please enjoy this encore of Word Notes. An open source Java-based software tool available from the Apache Software Foundation designed to log security and performance information.  CyberWire Gloss…
00:09:16  |   Tue 13 May 2025
What’s inside the mystery box? Spoiler: It’s a scam!

What’s inside the mystery box? Spoiler: It’s a scam!

As Dave Bittner is at the RSA Conference this week, our hosts ⁠⁠Maria Varmazis and ⁠⁠Joe Carrigan⁠⁠, are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that …
00:46:13  |   Thu 08 May 2025
Disclaimer: The podcast and artwork embedded on this page are the property of N2K Networks, Inc.. This content is not affiliated with or endorsed by eachpod.com.