Hacking Humans
Deception, influence, and social engineering in the world of cyber crime.

Avsnitt(769)

Public pianos and private scams.

Public pianos and private scams.

This week Joe and Dave share some interesting follow up from a few episodes ago where Dave shared his love for baby grand pianos and how scammers we're using that to lure people into traps. Listener G...

27 Juni 202439min

Encore: SOC Triad (noun) [Word Notes]

Encore: SOC Triad (noun) [Word Notes]

A best practice for framing cyber intelligence critical information requirements that recommends collecting and consolidating data from three specific sources: endpoint, network and log.

25 Juni 20245min

From dark shadows to main stage.

From dark shadows to main stage.

Brandon Kovacs, a Senior Red Team Consultant at Bishop Fox, is talking about how Artificial Intelligence is shaping the future of social engineering. Listener Adina wrote in to share their thoughts on...

20 Juni 202456min

Encore: supply chain attacks (noun) [Word Notes]

Encore: supply chain attacks (noun) [Word Notes]

Also known as a third-party attack or a value-chain attack, advisory groups gain access to a targeted victims network by first infiltrating a business partner's network that has access to the victim's...

18 Juni 20245min

False flags and fake voices.

False flags and fake voices.

This week we are joined by Maria Varmazis, host of the N2K daily space show, T-Minus. Maria's story covers the escalating efforts of pro-Russian propagandists to tarnish the Paris Summer Olympics and ...

13 Juni 202440min

Encore: taint analysis (noun) [Word Notes]

Encore: taint analysis (noun) [Word Notes]

The process of software engineers checking the flow of user input in application code to determine if unanticipated input can affect program execution in malicious ways.

11 Juni 20244min

Spotting social engineering in the shadows.

Spotting social engineering in the shadows.

This week, we are joined by Dr. Chris Pierson CEO at Black Cloak, and he is talking about some of the social engineering attacks his team is tracking. Joe's story follows how Microsoft Threat Intellig...

6 Juni 20241h 1min

The curious case of the missing IcedID. [Only Malware in the Building]

The curious case of the missing IcedID. [Only Malware in the Building]

Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence ...

4 Juni 202421min

Populärt inom Politik & nyheter

aftonbladet-krim
p3-krim
politiken
aftonbladet-daily
rss-krimstad
svenska-fall
spar
flashback-forever
rss-expressen-dok
rss-krimreportrarna
kungligt
rss-sanning-konsekvens
rss-vad-fan-hande
ett-rent-noje
rss-frandfors-horna
motiv
rss-flodet
blenda-2
krimmagasinet
svd-ledarredaktionen