

Hacking Humans
N2K Networks
Deception, influence, and social engineering in the world of cyber crime.
Episodes
Mentioned books

Nov 4, 2025 • 7min
Web 3.0 (noun) [Word Notes]
Please enjoy this encore of Word Notes.
The potential next evolution of the worldwide web that decentralizes interaction between users and content away from the big silicon valley social media platforms like Twitter, Facebook, and YouTube, and towards peer-to-peer interaction using blockchain as the underlying technology.
CyberWire Glossary link: https://thecyberwire.com/glossary/web-30
Audio reference link: “What Elon Musk Just Said about Metaverse, Web3 and Neuralink,” By Clayton Morris, Crypto News Daily, YouTube. 2 December 2021.

Nov 4, 2025 • 38min
Pass the intel, please. [OMITB]
Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by her co-hosts N2K Networks Dave Bittner and Keith Mularski, former FBI cybercrime investigator and now Chief Global Ambassador at Qintel.
Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we explore what makes information sharing actually work. From public-private partnerships to actionable intelligence, our guests discuss how organizations can prioritize, process, and operationalize shared cyber threat data to stay ahead of emerging risks.
Plus, catch Dave, Selena, and Keith on their road trip adventure in our video on YouTube — full of laughs, unexpected detours, and plenty of sleuthing!

Oct 31, 2025 • 3min
The Malware Mash!
Get into the Halloween spirit with a catchy malware parody that explores the spooky world of cyber threats. From the infamous Stuxnet worm to the antics of dark web script kiddies, the discussion is both entertaining and informative. Enjoy vivid imagery of botnets, DDoS attacks, and ransomware as they paint a haunting picture of online dangers. A cheeky reference to Vladimir and the infamous NotPetya adds an international twist. Tune in for a celebration of defenders, all wrapped up in a fun music mash!

Oct 30, 2025 • 40min
Beware the boo-gus giveaway.
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. In our follow up, our hosts respond to a listener who wrote in with an insightful question about the role of wealth in scam susceptibility. Joe's story covers how a fake AI recruiter lures developers with a GitHub “technical assessment” that, when run, unleashes a five-stage malware chain to steal credentials, wallets, and install persistent backdoors. Maria has the story on a Halloween-themed phishing scam that lured victims with a fake Home Depot giveaway, using obfuscated code, stolen email threads, and tracking pixels to trick users into handing over personal and payment information. Dave’s story is on a convincing phishing email claiming Dashlane was hacked, showing how fear and urgency—even in obvious scams—can make anyone second-guess before thinking twice. Our catch of the day is from the scams sub-Reddit thread, and is how one user received a message from their "aunt" who wanted to be nice and grab the user a present.
Resources and links to stories:
How a fake AI recruiter delivers five staged malware disguised as a dream job
Home Depot Halloween phish gives users a fright, not a freebie
Why the Obviously Fake Dashlane Hack Phishing Email Still Made Me Jump
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.

Oct 28, 2025 • 12min
Identity access management (IAM) (noun) [Word Notes]
Please enjoy this encore of Word Notes.
A set of solutions for ensuring that the right users can only access the appropriate resources.
CyberWire Glossary link: https://thecyberwire.com/glossary/identity-and-access-management
Audio reference link: “The Wrath of Khan (1982) ‘Kirk’s Response,’” by Russell, YouTube, 16 May 2017.

Oct 23, 2025 • 45min
Liar, liar, AI on fire.
This week, while Dave Bittner is on vacation, hosts Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Users are reporting a potential new Signal scam involving fake in-app messages posing as official support, though Signal confirms it never contacts users first and only communicates via Signal email addresses. Joe’s story is on South Korea targeting Cambodia’s scam industry after reports of kidnappings, torture, and a death, as officials crack down on criminal groups luring citizens into forced online fraud operations across Southeast Asia. Maria has the story on how AI-driven scams like deepfakes and virtual kidnappings are increasingly targeting Gen Z, using fake voices and videos to power extortion schemes that exploit their mobile-first, always-online lives. Listener DarkProphet6 shares a clever phishing attempt disguised as a fake Cloudflare “I’m not a robot” check, which tried to trick users into pasting malicious code into their terminal — a move that could have created a remote shell for attackers.
Resources and links to stories:
South Korea Targets Cambodia’s Scam Industry After Kidnappings, Torture and a Death
Feds seize $15 billion in bitcoin after busting alleged global crypto scam
China sentences 11 members of mafia family to death
AI-driven scams are preying on Gen Z’s digital lives
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.

Oct 21, 2025 • 6min
Policy Orchestration (noun) [Word Notes]
Please enjoy this encore of Word Notes.
The deployment of rules to the security stack across all data islands, cloud, SaaS applications, data centers, and mobile devices designed to manifest an organization's cybersecurity first principle strategies of zero trust, intrusion kill chain prevention, resilience, and risk forecasting.
CyberWire Glossary link: https://thecyberwire.com/glossary/policy-orchestration
Audio reference link: “The Value of Using Security Policy Orchestration and Automation,” by David Monahan, uploaded by EMAResearch, 3 April, 2018

Oct 16, 2025 • 44min
Scams that steal more than money.
This week, our hosts Dave Bittner , Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Dave's story is on how older aspiring models like Judy were scammed into paying hundreds for fake photoshoots, and how to avoid falling for similar tricks. Joe’s got the story of how Bitcoin ATMs are being exploited by scammers, costing Americans millions and targeting mostly older victims. Maria's got the story of a rapidly spreading WhatsApp “Vote for My Child” scam across Europe that hijacks accounts and extorts money through emotional trickery. Our catch of the day comes from Reddit, where a user is messaged by the one and only Barack Obama.
Resources and links to stories:
I was fooled into paying £500 to be a model. Here's how to avoid my mistake
Bitcoin ATMs increasingly used by scammers to target victims, critics say
WhatsApp ‘Vote for My Child’ Scams Are Rapidly Spreading Across Europe, Bitdefender Lab Warns
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.

Oct 14, 2025 • 6min
Abstraction layer (noun) [Word Notes]
Please enjoy this encore of Word Notes.
A process of hiding the complexity of a system by providing an interface that eases its manipulation.
CyberWire Glossary link: https://thecyberwire.com/glossary/abstraction-layer
Audio reference link: “What Is Abstraction in Computer Science,” by Codexpanse, YouTube, 29 October 2018.

Oct 9, 2025 • 47min
The text trap tightens.
This week, our hosts Dave Bittner , Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Listener Chad wrote in after hearing an episode to share that he received a suspicious call that sounded like a prison-related scam. Maria’s story is on a new Consumer Reports study revealing a surge in texting and messaging scams, with young adults hit hardest and major disparities in who loses money. Joe covers the story on YouTuber Tai Lopez — famous for his “here in my garage” videos — being charged by the SEC for running a $112 million Ponzi-like investment scheme. Dave’s got the story on a new Android trojan called Datzbro that targets seniors with AI-generated Facebook travel events, leading to device takeovers and financial fraud. Our catch of the day comes from listener Cameron, who shares an "urgent message from Union Bank."
Resources and links to stories:
Consumer Reports study finds surge in texting and messaging scams
SEC Says ‘Here in My Garage’ YouTuber Tai Lopez Ran a Ponzi Scheme
New Android Trojan "Datzbro" Tricking Elderly with AI-Generated Facebook Travel Events
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.


