Hacking Humans
Deception, influence, and social engineering in the world of cyber crime.

Denne podkasten er hentet fra en åpen RSS-feed og er ikke publisert av Podme. Den kan derfor inneholde annonser.

Episoder(770)

Abstraction layer (noun) [Word Notes]

Abstraction layer (noun) [Word Notes]

A process of hiding the complexity of a system by providing an interface that eases its manipulation. CyberWire Glossary link: https://thecyberwire.com/glossary/abstraction-layer Audio reference link:...

5 Jul 20225min

The top 10 brand names most likely used in a phishing scheme.

The top 10 brand names most likely used in a phishing scheme.

Omer Dembinsky, a Data Research Manager from Check Point Research, joins Dave to discuss their Brand Phishing Report for Q1 2022 and how DHL, Maersk, and AliExpress were all in the top 10 list. Joe an...

30 Jun 202244min

Identity Fabric (noun) [Word Notes]

Identity Fabric (noun) [Word Notes]

A set of services for managing identity and access management, or IAM across all of an organization's data islands. CyberWire Glossary link: https://thecyberwire.com/glossary/identity-fabric Audio ref...

28 Jun 20226min

North Korea and a global cyber war.

North Korea and a global cyber war.

Carole Theriault interviews author and journalist Geoff White on his upcoming book, "The Lazarus Heist: From Hollywood to High Finance: Inside North Korea's Global Cyber War." Joe and Dave share some ...

23 Jun 202238min

Intrusion Kill Chain (noun) [Word Notes]

Intrusion Kill Chain (noun) [Word Notes]

A cybersecurity first principle strategy focused on disrupting known adversary activity at one of several phases of an attack sequence. CyberWire Glossary link: https://thecyberwire.com/glossary/intru...

21 Jun 20227min

The great resignation and data exposure challenges.

The great resignation and data exposure challenges.

Abhik Mitra, Head of Portfolio Strategy at Code42, shares the findings on Code 42's 2022 Data Exposure Report (DER). Joe breaks down a story that follows a couple in Westlake, where the woman was call...

16 Jun 202251min

Identity Orchestration (noun) [Word Notes]

Identity Orchestration (noun) [Word Notes]

A subset of security orchestration, the management of identities across an organization's set of digital islands.  CyberWire Glossary link: https://thecyberwire.com/glossary/identity-orchestration

14 Jun 20226min

What to look out for with scan-and-exploit cyber attacks.

What to look out for with scan-and-exploit cyber attacks.

Andrew Morris, founder and CEO of GreyNoise Intelligence, joins Dave to discuss the explosive increase in opportunistic scan-and-exploit cyber attacks, and what security analysts can do to combat it. ...

9 Jun 202247min

Populært innen Politikk og nyheter

giver-og-gjengen-vg
aftenpodden
forklart
aftenpodden-usa
popradet
stopp-verden
fotballpodden-2
det-store-bildet
nokon-ma-ga
rss-gukild-johaug
rss-ness
lydartikler-fra-aftenposten
rss-espen-lee-usensurert
hanna-de-heldige
dine-penger-pengeradet
aftenbla-bla
rss-penger-polser-og-politikk
rss-dannet-uten-piano
rss-utenrikskomiteen-med-bogen-og-grasvik
grasoner-den-nye-kalde-krigen