1. EachPod
EachPod
Hacking Humans - Podcast

Hacking Humans

Deception, influence, and social engineering in the world of cyber crime.

Technology Tech News News
Update frequency
every 3 days
Average duration
26 minutes
Episodes
696
Years Active
2018 - 2025
Share to:
Encore: AI versus AI.

Encore: AI versus AI.

Blair Cohen from AuthenticID joins Dave to discuss how generative AI and authentication go hand in hand. Joe and Dave share some follow up from listener Robert who discusses an ad for a device that u…
00:54:28  |   Thu 04 Jul 2024
Operation Endgame: The ultimate troll patrol. [Only Malware in the Building]

Operation Endgame: The ultimate troll patrol. [Only Malware in the Building]

Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence…
00:28:34  |   Tue 02 Jul 2024
Encore: network telescope (noun) [Word Notes]

Encore: network telescope (noun) [Word Notes]

Network observation systems designed to monitor globally unreachable but unused Internet address space or the Deep Web in order to study a wide range of interesting Internet phenomena.
00:05:18  |   Tue 02 Jul 2024
Public pianos and private scams.

Public pianos and private scams.

This week Joe and Dave share some interesting follow up from a few episodes ago where Dave shared his love for baby grand pianos and how scammers we're using that to lure people into traps. Listener …
00:39:09  |   Thu 27 Jun 2024
Encore: SOC Triad (noun) [Word Notes]

Encore: SOC Triad (noun) [Word Notes]

A best practice for framing cyber intelligence critical information requirements that recommends collecting and consolidating data from three specific sources: endpoint, network and log.
00:05:21  |   Tue 25 Jun 2024
From dark shadows to main stage.

From dark shadows to main stage.

Brandon Kovacs, a Senior Red Team Consultant at Bishop Fox, is talking about how Artificial Intelligence is shaping the future of social engineering. Listener Adina wrote in to share their thoughts o…
00:56:38  |   Thu 20 Jun 2024
Encore: supply chain attacks (noun) [Word Notes]

Encore: supply chain attacks (noun) [Word Notes]

Also known as a third-party attack or a value-chain attack, advisory groups gain access to a targeted victims network by first infiltrating a business partner's network that has access to the victim'…
00:05:28  |   Tue 18 Jun 2024
False flags and fake voices.

False flags and fake voices.

This week we are joined by Maria Varmazis, host of the N2K daily space show, T-Minus. Maria's story covers the escalating efforts of pro-Russian propagandists to tarnish the Paris Summer Olympics and…
00:40:34  |   Thu 13 Jun 2024
Encore: taint analysis (noun) [Word Notes]

Encore: taint analysis (noun) [Word Notes]

The process of software engineers checking the flow of user input in application code to determine if unanticipated input can affect program execution in malicious ways.
00:04:20  |   Tue 11 Jun 2024
Spotting social engineering in the shadows.

Spotting social engineering in the shadows.

This week, we are joined by Dr. Chris Pierson CEO at Black Cloak, and he is talking about some of the social engineering attacks his team is tracking. Joe's story follows how Microsoft Threat Intelli…
01:01:21  |   Thu 06 Jun 2024
The curious case of the missing IcedID. [Only Malware in the Building]

The curious case of the missing IcedID. [Only Malware in the Building]

Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence…
00:21:58  |   Tue 04 Jun 2024
Encore: ATM skimming (noun) [Word Notes]

Encore: ATM skimming (noun) [Word Notes]

The process of stealing ATM customer credentials by means of physically and covertly installing one or more devices onto a public ATM machine.
00:04:57  |   Tue 04 Jun 2024
The AirBnB booking that wasn’t.

The AirBnB booking that wasn’t.

This week we are joined by Maria Varmazis, host of the N2K daily space show, T-Minus. Maria shares an interesting story from a listener, who writes in on an AirBnB debacle he was dealing with. Joe sh…
00:51:18  |   Thu 30 May 2024
Encore: APT side hustle (noun) [Word Notes]

Encore: APT side hustle (noun) [Word Notes]

A nation-state hacking group’s practice of funding its town activities through cybercrime or cyber mercenary work.
00:05:29  |   Tue 28 May 2024
Awareness, behavior, & beyond.

Awareness, behavior, & beyond.

This week, we are joined by host of 8th Layer Insights, Perry Carpenter from KnowBe4 and Dr. Jessica Barker from Cygenta to discuss human risk: awareness, behavior and beyond. Joe and Dave share some…
01:04:22  |   Thu 23 May 2024
Encore: endpoint (noun) [Word Notes]

Encore: endpoint (noun) [Word Notes]

A device connected to a network that accepts communications from other endpoints like laptops, mobile devices, IoT equipment, routers, switches, and any tool on the security stack.
00:06:05  |   Tue 21 May 2024
Psychology and scams.

Psychology and scams.

This week we are joined by Maria Varmazis, host of the N2K daily space show, T-Minus. Maria shares an interesting story about how ransomware infections are beginning to change to form a more psycholo…
00:43:55  |   Thu 16 May 2024
Encore: unified extensible firmware interface (UEFI) (noun) [Word Notes]

Encore: unified extensible firmware interface (UEFI) (noun) [Word Notes]

An extension of the traditional Basic Input/Output System or BIOS that, during the boot process, facilitates the communication between the computer’s firmware and the computer’s operating system.
00:05:56  |   Tue 14 May 2024
The illusion of influence.

The illusion of influence.

Bogdan Botezatu from Bitdefender is discussing research on "Audio deepfakes: Celebrity-endorsed giveaway scams and fraudulent investment opportunities flood social media platforms." Dave and Joe shar…
01:01:53  |   Thu 09 May 2024
Encore: Daemon (noun) [Word Notes]

Encore: Daemon (noun) [Word Notes]

An operating system program running in the background designed to perform a specific task when certain conditions or events occur.
00:04:49  |   Tue 07 May 2024
Disclaimer: The podcast and artwork embedded on this page are the property of N2K Networks, Inc.. This content is not affiliated with or endorsed by eachpod.com.