

Hacking Humans
N2K Networks
Deception, influence, and social engineering in the world of cyber crime.
Episodes
Mentioned books

May 20, 2025 • 6min
OWASP identification and authentication failures (noun) [Word Notes]
Please enjoy this encore of Word Notes.
Ineffectual confirmation of a user's identity or authentication in session management.
CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-identification-and-authentication-failure
Audio reference link: “Mr. Robot Hack - Password Cracking - Episode 1.” YouTube Video. YouTube, September 21, 2016.

May 15, 2025 • 44min
The band is finally back together.
And....we're back! This week, our three hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are all back to share the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. The team shares three bits of follow-up and then breaks into their stories. Joe starts off sharing some stories about influencer fakery on fake private jet sets and a scam taking advantage of the RealID requirements coming into effect. Maria talks about "Scam Survivor Day" (it's a real thing). She also talks about a former Facebooker's tell-all "Careless People." Dave shares a story about fake Social Security statements. Our Catch of Day comes from Richard about a truck win.
Resources and links to stories:
Private Executive Jet
Private Jet Set for exhibitions, events and photo opportunities
REAL ID scams surge with arrival of deadline Wednesday
Don't Blame the Victim: 'Fraud Shame' and Cybersecurity
Facebook Allegedly Detected When Teen Girls Deleted Selfies So It Could Serve Them Beauty Ads
Beware of Fake Social Security Statement That Tricks Users to Install Malware
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.

May 13, 2025 • 9min
Log4j vulnerability (noun) [Word Notes]
Please enjoy this encore of Word Notes.
An open source Java-based software tool available from the Apache Software Foundation designed to log security and performance information.
CyberWire Glossary link: https://thecyberwire.com/glossary/log4j
Audio reference link: “CISA Director: The LOG4J Security Flaw Is the ‘Most Serious’ She’s Seen in Her Career,” by Eamon Javers (CNBC) and Jen Easterly (Cybersecurity and Infrastructure Security Director) YouTube, 20 December 20 2021.

May 8, 2025 • 46min
What’s inside the mystery box? Spoiler: It’s a scam!
Delve into the latest in social engineering scams, including a wild tale of a fake app used to outsmart a bike thief. Discover the alarming rise of subscription scams that exploit consumers with deceptive mystery boxes and hidden fees. The hosts also discuss the SHIELD Act, aimed at banning revenge porn and the implications for encryption. Tune in for a listener's experience with a suspicious email offering a 'free gift,' serving as a classic scam alert. It’s a rollercoaster ride through the digital jungle of fraud!

May 6, 2025 • 42min
The RMM protocol: Remote, risky, and ready to strike. [OMITB]
Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K Networks Dave Bittner and our newest co-host, Keith Mularski, former FBI cybercrime investigator and now Chief Global Ambassador at Quintel.
Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, our hosts discuss the growing trend of cybercriminals using legitimate remote monitoring and management (RMM) tools in email campaigns as a first-stage payload. They explore how these tools are being leveraged for data theft, financial fraud, and lateral movement within networks. With the decline of traditional malware delivery methods, including loaders and botnets, the shift toward RMMs marks a significant change in attack strategies. Tune in to learn more about this evolving threat landscape and how to stay ahead of these tactics.

May 6, 2025 • 8min
OWASP broken access control (noun) [Word Notes]
Please enjoy this encore of Word Notes.
Software users are allowed access to data or functionality contrary to the defined zero trust policy by bypassing or manipulating the installed security controls.

May 1, 2025 • 29min
The prince, the pretender, and the PSA.
As Maria is on vacation this week, our hosts Dave Bittner and Joe Carrigan, are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Joe and Dave are joined by guest Rob Allen from ThreatLocker who shares a story on how a spoofed call to the help desk unraveled into a full-blown cyber siege on MGM Resorts. Joe’s story is on a new FBI warning: scammers are impersonating the Internet Crime Complaint Center (IC3), the very site where people go to report online fraud. Dave's got the story of a so-called “Nigerian prince” scammer who turned out to be a 67-year-old man from Louisiana, now facing 269 counts of wire fraud for helping funnel money to co-conspirators in Nigeria. Our catch of the day comes from a scams subreddit, and is on a message received from the Department of Homeland Security reaching out to a user to share that they are a victim of fraud.
Resources and links to stories:
Investigating the MGM Cyberattack – How social engineering and a help desk put the whole strip at risk.
Brian Krebs LinkedIn
FBI Warns of Scammers Impersonating the IC3
IC3 2024 Report
'Nigerian prince' scammer was 67-year-old from Louisiana, police say
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.

Apr 29, 2025 • 7min
OWASP security misconfiguration (noun) [Word Notes]
Please enjoy this encore of Word Notes.
The state of a web application when it's vulnerable to attack due to an insecure configuration.
CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-security-misconfiguration
Audio reference link: “What Is the Elvish Word for Friend?” Quora, 2021.

Apr 24, 2025 • 43min
When AI lies, hackers rise.
This week, hosts dive into the nefarious world of scams, including the rise of fake banking apps that trick sellers into losing their goods. They also tackle the dangers of AI hallucinations, revealing how malicious software can hide in misleading packages. A shocking smishing campaign targeting toll payments is uncovered, with criminals impersonating services to steal sensitive information. Plus, listeners share their own experiences with suspicious messages, adding to the discussion of trust in digital communications.

Apr 22, 2025 • 8min
OWASP insecure design (noun) [Word Notes]
Please enjoy this encore episode of Word Notes. A broad OWASP Top 10 software development category representing missing, ineffective, or unforeseen security measures.CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-insecure-designAudio reference link: “Oceans Eleven Problem Constraints Assumptions.” by Steve Jones, YouTube, 4 November 2015.