551 episodes

Deception, influence, and social engineering in the world of cyber crime.

Hacking Humans N2K Networks

    • Technology
    • 4.6 • 280 Ratings

Deception, influence, and social engineering in the world of cyber crime.

    Encore: supply chain attacks (noun) [Word Notes]

    Encore: supply chain attacks (noun) [Word Notes]

    Also known as a third-party attack or a value-chain attack, advisory groups gain access to a targeted victims network by first infiltrating a business partner's network that has access to the victim's systems or data.

    • 5 min
    You Might Also Like: Technically Speaking: An Intel Podcast

    You Might Also Like: Technically Speaking: An Intel Podcast

    Introducing Season 2 Episode 5 - AI and the Future of Retail from Technically Speaking: An Intel Podcast.
    Follow the show: Technically Speaking: An Intel Podcast
    Since the dawn of civilization, there have always been markets where people gather to purchase essentials and luxuries. But shopping has evolved dramatically since the days of the early bazaars, and the advent of new AI technology will shape the future of retail even more by making shopping easier, seamless and exciting for customers. Intel consumer industry specialist Shailesh Chaudhry and AI expert Aykut Dengi offer their insights into what the future holds for in-person retail, and how AI-enhanced technology can streamline the shopping experience and cut down on theft, waste and losses for business owners.

    Learn more about how Intel is leading the charge in the AI Revolution at intel.com/AIeverywhere
    See omnystudio.com/listener for privacy information.
    DISCLAIMER: Please note, this is an independent podcast episode not affiliated with, endorsed by, or produced in conjunction with the host podcast feed or any of its media entities. The views and opinions expressed in this episode are solely those of the creators and guests. For any concerns, please reach out to [email protected].

    False flags and fake voices.

    False flags and fake voices.

    This week we are joined by Maria Varmazis, host of the N2K daily space show, T-Minus. Maria's story covers the escalating efforts of pro-Russian propagandists to tarnish the Paris Summer Olympics and erode Western support for Ukraine, employing bold tactics like using AI to mimic Tom Cruise's voice. Joe and Dave share quite a bit of listener follow up, the first on is regarding the AirBnB story from a few weeks ago, the second one is from listener Lawrence who wrote in to verify dave’s comments about American Express, and the last one is from listener Tait, who shares some info on how they stay safe with banking. Joe has two stories for this week, the first one is on how the FBI is investigating the city of Gooding after they sent $1 million to a contractor for a wastewater project but later learned it was the victim of a scam. Joe's second story follows how a scammer dupes a Las Vegas woman out of $9,000 using a simple trick after turning up on her doorstep. Dave shares Avast's Q1, 2024 threat report. Our catch of the day comes from listener Clinton who wrote in to share and invoice he received from Apple Global requesting almost $1400.
    Please take a moment to fill out an audience survey! Let us know how we are doing!
    Links to the stories:

    City of Gooding scammed out of $1 million, officials say

    Scammer dupes Las Vegas woman out of $9,000 using a simple trick after turning up on her doorstep... so can you spot it?

    Avast Q1/2024 Threat Report

    Russians target Olympics with fake AI-generated Tom Cruise video


    You can hear more from the T-Minus space daily show here.
    Have a Catch of the Day you'd like to share? Email it to us at [email protected].

    • 40 min
    Encore: taint analysis (noun) [Word Notes]

    Encore: taint analysis (noun) [Word Notes]

    The process of software engineers checking the flow of user input in application code to determine if unanticipated input can affect program execution in malicious ways.

    • 4 min
    Spotting social engineering in the shadows.

    Spotting social engineering in the shadows.

    This week, we are joined by Dr. Chris Pierson CEO at Black Cloak, and he is talking about some of the social engineering attacks his team is tracking. Joe's story follows how Microsoft Threat Intelligence has observed the financially motivated cybercriminal group Storm-1811 misusing the client management tool Quick Assist in social engineering attacks. Dave share's the story of the lure of a free baby grand piano to deceive over 125,000 email recipients, mainly targeting North American university students and faculty, earning at least $900,000. Our catch of the day comes from listener Chuck who writes in to share some of his junk mail he has been receiving recently, and shares concerns for other listeners.
    Please take a moment to fill out an audience survey! Let us know how we are doing!
    Links to the stories:

    Threat actors misusing Quick Assist in social engineering attacks leading to ransomware

    Free Piano phish targets American university students, staff


    Have a Catch of the Day you'd like to share? Email it to us at [email protected].

    • 1 hr 1 min
    The curious case of the missing IcedID. [Only Malware in the Building]

    The curious case of the missing IcedID. [Only Malware in the Building]

    Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K Networks Dave Bittner and Rick Howard to uncover the stories behind notable cyberattacks. 
    Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we talk about "The curious case of the missing IcedID."
    IcedID is a malware originally classified as a banking trojan and was first observed in 2017. It also acts as a loader for other malware, including ransomware, and was a favored payload used by multiple cybercriminal threat actors until fall 2023.
    Then, it all but disappeared. In its place, a new threat crawled: Latrodectus. Named after a spider, this new malware, created by the same people as IcedID, is now poised to take over where IcedID melted off.
    Today we look back at what happened to the once prominent payload, and what its successor’s spinning web of activity means for the overall landscape.

    • 21 min

Customer Reviews

4.6 out of 5
280 Ratings

280 Ratings

Duster008 ,

Great show

I listen to every episode, twice. 😊 Thanks for a great show.

[REDACTED] USER ,

I now can listen again! Great podcast! It now plays using VPNs with anti malware/anti tracking VPNs.

I now can listen again! Great podcast! It now plays using VPNs with anti malware/anti tracking VPNs.

FreshDoughnuts ,

Great Entertainment

Despite the real and tangible value of the information in this podcast, it’s just so entertaining! Concise, well curated, and delivered in a way that non-techies can also enjoy it!

Top Podcasts In Technology

Search Engine
PJ Vogt, Audacy, Jigsaw
Acquired
Ben Gilbert and David Rosenthal
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Lex Fridman Podcast
Lex Fridman
Hard Fork
The New York Times
Underserved
Andrew Gelina

You Might Also Like

CyberWire Daily
N2K Networks
Malicious Life
Malicious Life
Smashing Security
Graham Cluley & Carole Theriault
Hacked
Hacked
Cyber Security Headlines
CISO Series
Click Here
Recorded Future News