1. EachPod

Hacking Humans - Podcast

Hacking Humans

Deception, influence, and social engineering in the world of cyber crime.

Technology Tech News News
Update frequency
every 3 days
Average duration
26 minutes
Episodes
696
Years Active
2018 - 2025
Share to:
The new malware on the block. [Only Malware in the Building]

The new malware on the block. [Only Malware in the Building]

Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence…
00:33:03  |   Tue 04 Mar 2025
zero trust (noun) [Word Notes]

zero trust (noun) [Word Notes]

Please enjoy this encore of Word Notes. A security philosophy that assumes adversaries have already penetrated the digital environment and tries to reduce the potential impact by limiting access by …
00:09:02  |   Tue 04 Mar 2025
Live from Orlando, it's Hacking Humans!

Live from Orlando, it's Hacking Humans!

In this special live episode of Hacking Humans, recorded at ThreatLocker’s Zero Trust World 2025 conference in Orlando, Florida, Dave Bittner is joined by T-Minus host Maria Varmazis. Together, they …
00:30:51  |   Thu 27 Feb 2025
OT security (noun) [Word Notes]

OT security (noun) [Word Notes]

Please enjoy this encore episode of Word Notes. Hardware and software designed to detect and prevent cyber adversary campaigns that target industrial operations.
00:08:13  |   Tue 25 Feb 2025
I'm a scammer and need support.

I'm a scammer and need support.

On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, a…
00:44:32  |   Thu 20 Feb 2025
cybersecurity skills gap (noun) [Word Notes]

cybersecurity skills gap (noun) [Word Notes]

Please enjoy this encore episode of Word Notes. The difference between organizational employee job requirements and the available skillsets in the potential employee pool.
00:07:43  |   Tue 18 Feb 2025
The “t” that tricked.

The “t” that tricked.

On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, a…
00:45:28  |   Thu 13 Feb 2025
digital transformation (noun) [Word Notes]

digital transformation (noun) [Word Notes]

Please enjoy this encore episode of Word Notes. The use of technology to radically improve the performance or reach of the business.
00:07:05  |   Tue 11 Feb 2025
Old school scams updated.

Old school scams updated.

On this episode of Hacking Humans, we are going old school with Dave Bittner and Joe Carrigan sans T-Minus host Maria Varmazis (as she was hanging out with astronauts at the SpaceCom event). Not to w…
00:35:11  |   Thu 06 Feb 2025
bulletproof hosting (noun) [Word Notes]

bulletproof hosting (noun) [Word Notes]

Please enjoy this encore episode of Word Notes. Cloud services intended for cyber criminals and other bad actors designed to obstruct law enforcement and other kinds of government investigations, and…
00:06:32  |   Tue 04 Feb 2025
Cyber Groundhog Day and romance scams. [Only Malware in the Building]

Cyber Groundhog Day and romance scams. [Only Malware in the Building]

Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence…
00:45:58  |   Tue 04 Feb 2025
Despicable donation request scamming.

Despicable donation request scamming.

On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, a…
00:44:47  |   Thu 30 Jan 2025
endpoint security [Word Notes]

endpoint security [Word Notes]

Please enjoy this encore of Word Notes. The practice of securing a device that connects to a network in order to facilitate communication with other devices on the same or different networks.
00:08:31  |   Tue 28 Jan 2025
Back to the office, back to the threats.

Back to the office, back to the threats.

On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, a…
00:43:11  |   Thu 23 Jan 2025
Executive Order on Improving the Nation's Cybersecurity (noun) [Word Notes]

Executive Order on Improving the Nation's Cybersecurity (noun) [Word Notes]

Please enjoy this encore episode. President Biden's May, 2021 formal compliance mandate for federal civilian executive branch agencies, or FCEBs, to include specific shortterm and longterm deadlines …
00:08:14  |   Tue 21 Jan 2025
Crypto chameleons and star fraud.

Crypto chameleons and star fraud.

On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, a…
00:41:52  |   Thu 16 Jan 2025
lateral movement (noun) [Word Notes]

lateral movement (noun) [Word Notes]

Phase of a typical cyber adversary group's attack sequence, after the initial compromise and usually after the group has established a command and control channel, where the group moves through the v…
00:08:03  |   Tue 14 Jan 2025
Nice to meet you, I'm a scammer.

Nice to meet you, I'm a scammer.

On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, a…
00:52:58  |   Thu 09 Jan 2025
common vulnerabilities and exposures (CVE) (noun) [Word Notes]

common vulnerabilities and exposures (CVE) (noun) [Word Notes]

A public list sponsored by the US government and designed to uniquely identify, without the need to manually cross- reference, all the known software vulnerabilities in the world.
00:07:13  |   Tue 07 Jan 2025
Malware metamorphosis: 2024 reflections and 2025 predictions. [Only Malware in the building]

Malware metamorphosis: 2024 reflections and 2025 predictions. [Only Malware in the building]

Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence…
00:51:56  |   Tue 07 Jan 2025
Disclaimer: The podcast and artwork embedded on this page are the property of N2K Networks, Inc.. This content is not affiliated with or endorsed by eachpod.com.