

Hacking Humans
N2K Networks
Deception, influence, and social engineering in the world of cyber crime.
Episodes
Mentioned books

Jan 29, 2026 • 46min
Cold weather, hot scams.
Scammers exploit a Verizon outage to push fake credits and phish credentials. A rare big-money recovery story follows a woman who lost nearly $1 million to tech-support fraud. Fraudsters prey on Ozempic and GLP-1 demand with counterfeit pharmacies and deepfake ads. Winter brings utility impersonation scams using urgent shutoff threats and unusual payment requests.

Jan 27, 2026 • 7min
Indicators of Compromise (noun) [Word Notes]
Clear definition of digital traces that show a system or network was breached. A look at early IOC practices like IPs and hashes and why they often failed. How MITRE ATT&CK and TTPs improved prediction by focusing on attacker behavior. An analogy using Sherlock demonstrates how multiple clues combine to reveal the true pattern.

Jan 22, 2026 • 47min
Scammers gonna scam.
This week, hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Joe share's another chicken update for us, this time from Werner Herzog. Dave’s got a story from a listener named Tim, an IRS Criminal Investigation agent, who explains that real CI agents may contact people unannounced and can verify themselves in person, but if anyone asks for gift cards or crypto, it’s definitely a scam. Maria has the story on how attackers are abusing real SendGrid accounts to send politically charged phishing emails that look legitimate and trick users into handing over their credentials. Joe has two stories this week, the first on Cambodia’s renewed crackdown on massive Southeast Asian scam networks following the arrest and extradition of alleged kingpin Chen Zhi, signaling deeper international cooperation against fraud operations that have stolen billions worldwide, and the second on a Nashville Uber driver who lost $300 after falling for a convincing phone scam that impersonated Uber Support and falsely accused him of drunk driving. Our catch of the day comes from Reddit scams where one scammer gets put through the ringer, twice.
Resources and links to stories:
Cambodia to keep up crackdown on scam centres after arrest of alleged mastermind
Uber driver describes drunk driving scam that cost him $300
SendGrid isn’t emailing you about ICE or BLM. It’s a phishing attack.
Dave Part 1
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.

Jan 20, 2026 • 8min
Intrusion Detection System (noun) [Word Notes]
Please enjoy this encore of Word Notes.
A system that monitors for malicious or unwanted activity, and either raises alerts when such activity is detected or blocks the traffic from passing to the target.
CyberWire Glossary link: https://thecyberwire.com/glossary/intrusion-detection-system
Audio reference link: “Network Intrusion Detection and Prevention - CompTIA Security+ SY0-501 - 2.1,” Professor Messer, uploaded 16 November, 2017

Jan 15, 2026 • 51min
When a scammer meets the Force.
Rishika Desai, a Threat Researcher and Writer at Bfore.ai, dives into the dark world of social media ad-account rentals exploited by scammers. She reveals how fraudsters cleverly use synthetic identities and fake documents to create these accounts, amplifying their malicious campaigns. The discussion sheds light on the psychological tactics behind romance scams, including emotional manipulation and the impact on legitimate businesses. Plus, a hilarious Reddit entry shows a listener using Star Wars to fend off a scammer, proving that the Force can indeed be with you!

Jan 13, 2026 • 7min
MFA prompt bombing (noun) [Word Notes]
Explore the intriguing tactic of MFA prompt bombing, where attackers overwhelm users with constant authentication requests until they give in. Hear a vivid example of a user approving endless prompts out of sheer frustration. Discover how cybercriminals exploit this weakness, referencing real-world cases like Lapsus group activities. Enjoy a fun analogy comparing the technique to a scene from the movie 'Sneakers', highlighting the persistence needed to bypass security. This session dives deep into user psychology and the vulnerabilities cyber attackers exploit.

Jan 8, 2026 • 53min
It's just too good to be true.
This week, the hosts dive into alarming social engineering scams ramping up for the holiday season. There's a congressional alert about fake travel bookings that could lead to massive losses. A shocking investigation reveals fraudulent crowdfunding exploited sick children for millions intended for treatment. The discussion also highlights IRS warnings on tax scams, outlining red flags to watch for. Additionally, a humorous segment features a scammer impersonating a celebrity, showcasing the creative tactics used to mislead victims.

Jan 6, 2026 • 45min
Poisoned at the source. [OMITB]
Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by her co-hosts N2K Networks Dave Bittner and Keith Mularski, former FBI cybercrime investigator and now Chief Global Ambassador at Qintel.
Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we dive into supply chain attacks through the lens of a massive Android malware campaign that infects devices before they ever reach users, embedding itself in firmware and reseller-installed system images. We connect the dots to other high-impact supply chain incidents—from SolarWinds to the recent F5 breach—and share new intelligence on Android devices compromised during manufacturing and distribution in China. Together, these cases highlight how attacks at the source can quietly scale, persist, and evade traditional defenses.

Jan 6, 2026 • 6min
Apple Lockdown Mode (noun) [Word Notes]
Please enjoy this encore of Word Notes.
An optional security mode for macOS and iOS that reduces the attack surface of the operating system by disabling certain commonly attacked features.
CyberWire Glossary link: https://thecyberwire.com/glossary/apple-lockdown-mode
Audio reference link: “How NSO Group’s Pegasus Spyware Was Found on Jamal Khashoggi’s Fiancée’s Phone,” FRONTLINE, YouTube, 18 July 2021.

Jan 1, 2026 • 37min
Hot sauce and hot takes: An Only Malware in the Building special.
While our team is out on winter break, please enjoy this episode of Only Malware in the Building.
Welcome in! You’ve entered, Only Malware in the Building — but this time, it’s not just another episode. This is a special edition you won’t want to miss.
For the first time, our hosts are together in-studio — and they’re turning up the heat. Literally. Join Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED, along with N2K Networks Dave Bittner and Keith Mularski, former FBI cybercrime investigator and now Chief Global Ambassador at Qintel, as they take on a fiery hot wings challenge while answering personal questions about themselves, their careers, and the stories that shaped them. Think you’ve seen them tackle malware mysteries before? Wait until you see them sweat.
This one’s too good for audio alone — you’ll want to watch the full video edition to catch every spicy reaction, every laugh, and maybe even a few tears.
So grab your milk, get ready to feel the burn, and come join us for this special hot take on Only Malware in the Building.


