1. EachPod
EachPod
Hacking Humans - Podcast

Hacking Humans

Deception, influence, and social engineering in the world of cyber crime.

Technology Tech News News
Update frequency
every 3 days
Average duration
26 minutes
Episodes
696
Years Active
2018 - 2025
Share to:
Let's go to the movies. [Hacking Humans Goes to the Movies]

Let's go to the movies. [Hacking Humans Goes to the Movies]

Welcome to a fun new project by the team who brings you Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are joined by Rick Howard in this series. Th…
00:25:11  |   Thu 11 Nov 2021
OT security (noun) [Word Notes]

OT security (noun) [Word Notes]

Hardware and software designed to detect and prevent cyber adversary campaigns that target industrial operations.
00:08:13  |   Tue 09 Nov 2021
Cybersecurity awareness should be a year-round activity.

Cybersecurity awareness should be a year-round activity.

Guest Dr. Jessica Barker from Cygenta talks with UK correspondent Carole Theriault about how every month should be cyber awareness month, Joe has a story about password spraying (kind of like a crede…
00:33:38  |   Thu 04 Nov 2021
cybersecurity skills gap (noun) [Word Notes]

cybersecurity skills gap (noun) [Word Notes]

The difference between organizational employee job requirements and the available skillsets in the potential employee pool.
00:07:43  |   Tue 02 Nov 2021
The Malware Mash!

The Malware Mash!

00:03:05  |   Fri 29 Oct 2021
Good grammar is essential for business email compromise.

Good grammar is essential for business email compromise.

Guest Brandon Hoffman from Intel 471 is back sharing some research on business email compromise, Dave's got a story on buying collectable sneakers and how bots make that really hard to do, Joe has tw…
00:41:42  |   Thu 28 Oct 2021
digital transformation (noun) [Word Notes]

digital transformation (noun) [Word Notes]

The use of technology to radically improve the performance or reach of the business.
00:07:05  |   Tue 26 Oct 2021
Joekens, Bittnercoins, and the serious impacts of spam analysis.

Joekens, Bittnercoins, and the serious impacts of spam analysis.

UK Correspondent Carole Theriault returns with an interview with Paul, a spam analyst, Dave and Joe have some follow-up, Joe revisits NFTs with rug pull scams, Dave's story is about phishers using a …
00:37:14  |   Thu 21 Oct 2021
bulletproof hosting (noun) [Word Notes]

bulletproof hosting (noun) [Word Notes]

Cloud services intended for cyber criminals and other bad actors designed to obstruct law enforcement and other kinds of government investigations, and to provide some protection against competitors.
00:06:32  |   Tue 19 Oct 2021
Physical pen testing: You've got to be able to think on your feet.

Physical pen testing: You've got to be able to think on your feet.

Guest Marina Ciavatta CEO at Hekate talks with Dave about some of her social engineering and pen testing experiences, Dave's got a story is about getting your family to use a password manager, Joe's …
00:47:10  |   Thu 14 Oct 2021
endpoint security (noun) [Word Notes]

endpoint security (noun) [Word Notes]

The practice of securing a device that connects to a network in order to facilitate communication with other devices on the same or different networks.
00:08:31  |   Tue 12 Oct 2021
Measuring security awareness proactively.

Measuring security awareness proactively.

Guest Zach Schuler of NINJIO joins Dave to discuss measuring the effectiveness of awareness training, Joe's got a story about a school nurse who was scammed with a "Bank of America" Zelle transaction…
00:50:11  |   Thu 07 Oct 2021
Executive Order on Improving the Nation's Cybersecurity (noun) [Word Notes]

Executive Order on Improving the Nation's Cybersecurity (noun) [Word Notes]

President Biden's May, 2021 formal compliance mandate for federal civilian executive branch agencies, or FCEBs, to include specific shortterm and longterm deadlines designed to enhance the federal go…
00:08:14  |   Tue 05 Oct 2021
Capture the Flag, Black Badges and social engineering tricks.

Capture the Flag, Black Badges and social engineering tricks.

Guest Chris Kirsch, DefCon 25 Social Engineering Capture The Flag winner and Co-Founder and Chief Executive Officer at Rumble, talks with our UK Correspondent Carole Theriault about his experience at…
00:40:21  |   Thu 30 Sep 2021
lateral movement (noun) [Word Notes]

lateral movement (noun) [Word Notes]

Phase of a typical cyber adversary group's attack sequence, after the initial compromise and usually after the group has established a command and control channel, where the group moves through the v…
00:08:03  |   Tue 28 Sep 2021
They won't ask for sensitive information over the phone.

They won't ask for sensitive information over the phone.

Guest Alex Hinchliffe, Threat Intelligence Analyst from Unit 42 at Palo Alto Networks joins Dave to talk about some of his team's ransomware research, Joe's story is about a new jury duty scam that i…
00:39:02  |   Thu 23 Sep 2021
common vulnerabilities and exposures (CVE) (noun) [Word Notes]

common vulnerabilities and exposures (CVE) (noun) [Word Notes]

A public list sponsored by the US government and designed to uniquely identify, without the need to manually cross- reference, all the known software vulnerabilities in the world.
00:07:13  |   Tue 21 Sep 2021
Sometimes, deepfake victims don't want to be convinced it is fake.

Sometimes, deepfake victims don't want to be convinced it is fake.

Guest Etay Maor of Cato Networks joins Dave Bittner to discuss the impact that deepfakes will have on our society, we share some fun feedback on the Lightning Rod story edit, Dave's story talks about…
00:44:08  |   Thu 16 Sep 2021
dead-box forensics (noun) [Word Notes]

dead-box forensics (noun) [Word Notes]

A forensic technique where practitioners capture an entire image of a system and analyze the contents offline.
00:06:16  |   Tue 14 Sep 2021
Collaboration platforms are a gateway for ransomware attacks.

Collaboration platforms are a gateway for ransomware attacks.

Guest Gil Friedrich from Avanan joins Dave to discuss how collaboration platforms, like Microsoft Teams, Slack and others, opened up a new gateway to ransomware attacks, Joe's story comes from listen…
00:33:29  |   Thu 09 Sep 2021
Disclaimer: The podcast and artwork embedded on this page are the property of N2K Networks, Inc.. This content is not affiliated with or endorsed by eachpod.com.