Hacking Humans cover image

Hacking Humans

Latest episodes

undefined
Nov 12, 2024 • 8min

secure access service edge (SASE) (noun) [Word Notes]

Explore the innovative concept of Secure Access Service Edge (SASE) and its game-changing role in cybersecurity. Discover how it integrates cloud models and simplifies network security. Delve into the comparison with traditional methods and see why embracing cloud resources leads to greater efficiency and security. Learn about the importance of vendor-provided security stacks and network peering with major content providers. This insightful discussion offers a fresh perspective on safeguarding digital infrastructures.
undefined
Nov 7, 2024 • 48min

Happy hour hacking.

Maria Varmazis, host of N2K's T-Minus, shares her unique insights as she explores the five types of social engineers she encountered while bartending. Each bar personality serves as a metaphor for common cybersecurity threats. The conversation also highlights the rise of tech support scams and the alarming tricks used to exploit the elderly. Additionally, there are hilarious anecdotes about car-selling scams and an analysis of a viral AI-generated hoax. It’s a lively mix of humor and caution, perfect for those curious about social engineering in everyday life.
undefined
Nov 5, 2024 • 40min

Whispers in the wires: A closer look at the new age of intrusion. [OMITB]

Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K Networks Dave Bittner and Rick Howard to uncover the stories behind notable cyberattacks. Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we talk about how threat actors are shifting tactics across the landscape, focusing more on advanced social engineering and refined initial access strategies than on sophisticated malware. We’ll dive into Proofpoint's latest blog detailing a transport sector breach that, while involving relatively standard malware, showcases this growing trend of nuanced techniques and toolsets.
undefined
Nov 5, 2024 • 6min

red teaming (noun) [Word Notes]

Explore the fascinating origins of red teaming, tracing its roots from historical military tactics to modern cybersecurity practices. Discover how this collaborative approach enhances training and boosts incident response within security organizations. The discussion reveals how emulating adversary behavior has become crucial for organizations aiming to strengthen their defenses against evolving threats.
undefined
Oct 31, 2024 • 4min

The Malware Mash

Celebrate Halloween with a comical twist on cyber threats! Journey through a parody of a classic song that cleverly explains malware, from Stuxnet to botnets. Discover the ongoing battle between cybersecurity experts and cybercriminals in a fun and accessible way. Enjoy humorous insights into viruses, phishing, and the infamous Dark Web. This entertaining take makes complex topics like adware and ransomware engaging for everyone!
undefined
Oct 31, 2024 • 50min

How political donations can be deceiving.

Maria Varmazis, host of N2K's T-Minus, reveals the chilling tactics behind political donation scams targeting vulnerable seniors. With alarming statistics, she sheds light on how manipulative texts can lead these individuals to make costly donations without their knowledge. The discussion also touches on the dangers of AI in scams, where real-time voice technology can mimic callers to deceive victims. Varmazis emphasizes the urgent need for awareness and family protection against these emotional and financial exploitations.
undefined
Oct 29, 2024 • 7min

next generation firewall (noun) [Word Notes]

Marcus Ranum, a pioneer in firewall technology and lead developer of the Gauntlet Firewall, shares insights into the evolution of next-generation firewalls. He discusses how these firewalls have transformed into layer 7 security orchestration platforms. Ranum highlights key advancements since the 1980s, the rise of subscription services, and the shifting market landscape. He even shares a personal anecdote from his journey in firewall development, leading to a discussion on AI-driven security solutions from companies like Vectra.
undefined
Oct 24, 2024 • 36min

Spiritual healers or master con artists?

Maria Varmazis, host of N2K's T-Minus, dives into the dark world of cybercrime. She reveals how the Telekopye scam toolkit is now targeting popular booking sites like Airbnb and Booking.com. The conversation shifts to the chilling 'blessing scam,' where fraudsters masquerade as spiritual healers to exploit vulnerable individuals, particularly older Chinese women. Additionally, Varmazis discusses new FTC rules aimed at simplifying subscription cancellations, emphasizing the need for consumer protection against such pervasive scams.
undefined
5 snips
Oct 22, 2024 • 7min

fast flux (noun) [Word Notes]

Dive into the intriguing world of cyber adversaries and their fast flux techniques. Discover how attackers manipulate DNS to obscure their command and control servers. A historical case from 2007 showcases the method's effectiveness in a malicious campaign. The discussion reveals the challenges posed to law enforcement and network defenders as they confront these dynamic IP address changes. Real-life incidents and cinematic examples underline the high stakes in this digital chess match.
undefined
Oct 17, 2024 • 45min

Cybercriminals thrive in vulnerable moments.

Maria Varmazis, host of T-Minus, sheds light on how cybercriminals exploit chaos after natural disasters like Hurricane Helene. She discusses common scams targeting vulnerable victims, including phishing attacks disguised as FEMA communications. The conversation also highlights alarming trends in cryptocurrency fraud, with U.S. authorities charging individuals for manipulating markets. It's a timely reminder of the need for vigilance in both natural disasters and the digital realm!

Get the Snipd
podcast app

Unlock the knowledge in podcasts with the podcast player of the future.
App store bannerPlay store banner

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode

Save any
moment

Hear something you like? Tap your headphones to save it with AI-generated key takeaways

Share
& Export

Send highlights to Twitter, WhatsApp or export them to Notion, Readwise & more

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode