1. EachPod

Hacking Humans - Podcast

Hacking Humans

Deception, influence, and social engineering in the world of cyber crime.

Technology Tech News News
Update frequency
every 3 days
Average duration
26 minutes
Episodes
696
Years Active
2018 - 2025
Share to:
The RMM protocol: Remote, risky, and ready to strike. [OMITB]

The RMM protocol: Remote, risky, and ready to strike. [OMITB]

Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is ⁠Selena Larson⁠, ⁠Proofpoint⁠ intellig…
00:39:40  |   Tue 06 May 2025
OWASP broken access control (noun) [Word Notes]

OWASP broken access control (noun) [Word Notes]

Please enjoy this encore of Word Notes. Software users are allowed access to data or functionality contrary to the defined zero trust policy by bypassing or manipulating the installed security cont…
00:07:30  |   Tue 06 May 2025
The prince, the pretender, and the PSA.

The prince, the pretender, and the PSA.

As Maria is on vacation this week, our hosts ⁠Dave Bittner⁠ and ⁠Joe Carrigan⁠, are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines.…
00:28:35  |   Thu 01 May 2025
OWASP security misconfiguration (noun) [Word Notes]

OWASP security misconfiguration (noun) [Word Notes]

Please enjoy this encore of Word Notes. The state of a web application when it's vulnerable to attack due to an insecure configuration.  CyberWire Glossary link: ⁠https://thecyberwire.com/glossary…
00:07:03  |   Tue 29 Apr 2025
When AI lies, hackers rise.

When AI lies, hackers rise.

This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal expl…
00:42:37  |   Thu 24 Apr 2025
OWASP insecure design (noun) [Word Notes]

OWASP insecure design (noun) [Word Notes]

Please enjoy this encore episode of Word Notes. A broad OWASP Top 10 software development category representing missing, ineffective, or unforeseen security measures. CyberWire Glossary link: https:…
00:08:19  |   Tue 22 Apr 2025
Phishing in the tariff storm.

Phishing in the tariff storm.

This week, our hosts Dave Bittner and Joe Carrigan, are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines, while our other host, Maria …
00:34:57  |   Thu 17 Apr 2025
OWASP injection (noun) [Word Notes]

OWASP injection (noun) [Word Notes]

Please enjoy this encore of Word Notes. A broad class of attack vectors, where an attacker supplies input to an applications command interpreter that results in unanticipated functionality.  CyberWir…
00:06:32  |   Tue 15 Apr 2025
You get a million dollars, and you get a million dollars!

You get a million dollars, and you get a million dollars!

This week, while Dave Bittner is out, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are sharing the latest in social engineering scams, phishing schemes, and cri…
00:37:12  |   Thu 10 Apr 2025
OWASP cryptographic failures (noun) [Word Notes]

OWASP cryptographic failures (noun) [Word Notes]

Please enjoy this encore of Word Notes. Code that fails to protect sensitive information.  CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-cryptographic-failure Audio reference link:…
00:06:35  |   Tue 08 Apr 2025
Not-so-real deals.

Not-so-real deals.

This week our hosts, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are sharing the latest in social engineering scams, phishing schemes, and crimin…
00:46:12  |   Thu 03 Apr 2025
account takeover prevention (noun) [Word Notes]

account takeover prevention (noun) [Word Notes]

Enjoy this encore of Word Notes. The prevention of the first part of an intrusion kill chain model exploitation technique, where the hacker steals valid logging credentials from a targeted victim.  …
00:06:23  |   Tue 01 Apr 2025
Hello? Is it malware you’re looking for? [OMITB]

Hello? Is it malware you’re looking for? [OMITB]

Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence…
00:34:37  |   Tue 01 Apr 2025
Smells like scam season is upon us.

Smells like scam season is upon us.

This week our hosts, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are sharing the latest in social engineering scams, phishing schemes, and crimin…
00:48:51  |   Thu 27 Mar 2025
threat hunting (noun) [Word Notes]

threat hunting (noun) [Word Notes]

Please enjoy this encore of Word Notes. The process of proactively searching through networks to detect and isolate security threats, rather than relying on security solutions or services to detect …
00:07:01  |   Tue 25 Mar 2025
E-ZPass or easy scam?

E-ZPass or easy scam?

On Hacking Humans, this week Dave Bittner is back with Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), and they are sharing the latest in social engineering scams,…
00:36:26  |   Thu 20 Mar 2025
vulnerability management (noun) [Word Notes]

vulnerability management (noun) [Word Notes]

Please enjoy this encore of Word Notes. The continuous practice of identifying classifying, prioritizing, remediating, and mitigating software vulnerabilities within this. CyberWire Glossary link: ht…
00:08:16  |   Tue 18 Mar 2025
Catch me if you scam.

Catch me if you scam.

On Hacking Humans, this week Dave Bittner is on vacation so our two hosts Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are sharing the latest in social engineer…
00:41:34  |   Thu 13 Mar 2025
software bill of materials (SBOM) (noun) [Word Notes]

software bill of materials (SBOM) (noun) [Word Notes]

Please enjoy this encore of Word Notes. A formal record containing the details and supply chain relationships of various components used in building software.
00:06:59  |   Tue 11 Mar 2025
Scams in the henhouse.

Scams in the henhouse.

On Hacking Humans, this week Dave Bittner is on vacation so our two hosts Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are sharing the latest in social enginee…
00:34:38  |   Thu 06 Mar 2025
Disclaimer: The podcast and artwork embedded on this page are the property of N2K Networks, Inc.. This content is not affiliated with or endorsed by eachpod.com.