Hacking Humans – Details, episodes & analysis

Podcast details

Technical and general information from the podcast's RSS feed.

Hacking Humans

Hacking Humans

N2K Networks

News
Technology

Frequency: 1 episode/4d. Total Eps: 681

Megaphone
Deception, influence, and social engineering in the world of cyber crime.
Site
RSS
Apple

Recent rankings

Latest chart positions across Apple Podcasts and Spotify rankings.

Apple Podcasts
  • 🇨🇦 Canada - techNews

    30/07/2025
    #71
  • 🇬🇧 Great Britain - techNews

    30/07/2025
    #11
  • 🇩🇪 Germany - techNews

    30/07/2025
    #69
  • 🇺🇸 USA - techNews

    30/07/2025
    #19
  • 🇫🇷 France - techNews

    30/07/2025
    #24
  • 🇨🇦 Canada - techNews

    29/07/2025
    #67
  • 🇬🇧 Great Britain - techNews

    29/07/2025
    #13
  • 🇩🇪 Germany - techNews

    29/07/2025
    #70
  • 🇺🇸 USA - techNews

    29/07/2025
    #20
  • 🇫🇷 France - techNews

    29/07/2025
    #57
Spotify

    No recent rankings available



RSS feed quality and score

Technical evaluation of the podcast's RSS feed quality and structure.

See all
RSS feed quality
Good

Score global : 73%


Publication history

Monthly episode publishing history over the past years.

Episodes published by month in

Latest published episodes

Recent episodes with titles, durations, and descriptions.

See all

SaaS (noun) [Word Notes]

Season 1 · Episode 47

mardi 3 septembre 2024Duration 06:04

Enjoy this special edition of Word Notes: A cloud-based software distribution method where app infrastructure, performance, and security are maintained by a service provider and accessible to users, typically via subscription, from any device connected to the internet.

RATs in the tunnel: Uncovering the cyber underworld. [OMITB]

Season 1 · Episode 4

mardi 3 septembre 2024Duration 38:05

Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K Networks Dave Bittner and Rick Howard to uncover the stories behind notable cyberattacks.  Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we talk about the abuse of legitimate services for malware delivery. Proofpoint has seen an increase in the abuse of tools like ScreenConnect and NetSupport, as well as Cloudflare Tunnel abuse and the use of IP filtering. They have also observed a rise in financially motivated malware delivery using TryCloudflare Tunnel abuse, focusing on remote access trojans (RATs) like Xworm and AsyncRAT. Today we look at how Cloudflare tunnels are used to evade detection and how they have evolved their tactics by incorporating obfuscation techniques, with ongoing research to identify the threat actors involved.

cold boot attack (noun) [Word Notes]

Season 1 · Episode 43

mardi 6 août 2024Duration 06:59

Please enjoy this special encore episode of Word Notes. A type of side channel attack in which an attacker with physical access to a computer performs a memory dump of a computer’s Random Access Memory or RAM during the reboot process in order to steal sensitive data. 

joint cyber defense collaborative (JCDC) (noun) [Word Notes]

Season 4 · Episode 159

mardi 3 octobre 2023Duration 07:25

A cyber information-sharing U.S. Government organization designed to foster the public-private partnership. CyberWire Glossary link: https://thecyberwire.com/glossary/joint-cyber-defense-collaborative Audio reference link: Jen Easterly. 2021. CISA Director Addresses the National Technology Security Coalition [Video]. YouTube. URL https://www.youtube.com/watch?v=ucb1FQXqsao

Stealing your car's identity.

Season 6 · Episode 251

jeudi 28 septembre 2023Duration 58:50

This week our guest is, Sam Crowther, Kasada CEO, he's sharing his team's findings on "Stolen Auto Accounts: The $2 Price Tag on Your Car’s Identity." Joe and Dave share some listener follow up from Steve who writes in sharing an email he thought to be a scam, but turned out it was real. Listener Derek writes in with a question regarding AI and phishing emails. Joe's story comes from Proofpoint as they share their 2023 State of the Phish report. Dave's story follows an email that was sent out saying that the receiver has had a sexually explicit video leaked to an adults-only website, and to remove the video in question from the site, the receiver can send $200. Our catch of the day comes from listener Tony who writes in to share an email he and his school received claiming that the person who sent the email found pornographic material on the schools website. Links to follow-up and stories: 2023 State of the Phish Yikes! My sex video has been uploaded to YouPorn, apparently Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.

Encore: penetration test (noun) [Word Notes]

Season 1 · Episode 4

mardi 26 septembre 2023Duration 04:08

The process of evaluating the security of a system or network by simulating an attack on it. Sometimes called "ethical hacking" or white hat hacking. The phrase started to appear in U.S. military circles in the mid 1960s as time sharing computers became more necessary for daily operations. Computer security experts from Rand Corporation began describing computer compromises as “penetrations.” By the early 1970s, government leaders formed tiger teams of penetration testers to probe for weaknesses in various government systems.

Rooting vs routing. [Hacking Humans Goes to the Movies]

Season 3 · Episode 22

dimanche 24 septembre 2023Duration 28:10

Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined by Rick Howard in this series where they view clips from their favorite movies and television shows with examples of the social engineering scams and schemes you hear Dave and co-host Joe Carrigan talk about on Hacking Humans. In this episode, Dave and Rick watch each of the selected scenes, describe the on-screen action for you, and then they deconstruct what they saw. Grab your bowl of popcorn and join us for some fantastic scams and frauds. Links to this episode's clips if you'd like to watch along: Dave's clip from the movie: Matchstick Men Rick's clip from the movie: Mr. Robot

Hackers play the evasion game.

Season 6 · Episode 260

jeudi 21 septembre 2023Duration 53:46

This week our guest is, John Hammond from Huntress and he sits down to talk about spoofing and evasion techniques used by hackers. Dave and Joe share a bit of follow up, including a question form listener John who writes in asking about a passkey discussion in the last episode. Joe has a story from Reddit this week, where someone posted about a dispute they are having with their wedding caterer, where the company is saying the couple still owes them over $5,000 after the wedding has happened for umbrellas, the person posting wants to know what they should do about this argument. Dave's story is from Retool, where they are warning customers after an employee of theirs fell victim to a phishing scheme through SMS. Our catch of the day comes from the University of Alabama department of engineering, where the receiver of a suspicious looking email is being "sued" after owing $300 and not paying it back. Links to follow-up and stories: Accelerating the Availability of Simpler, Stronger Passwordless Sign-Ins When MFA isn't actually MFA Wedding caterer charging us $5,000 post-wedding for their accountant’s error Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.

Cloud Security Posture Management (CSPM) (noun) [Word Notes]

Season 4 · Episode 158

mardi 19 septembre 2023Duration 07:18

Tools that automate the identification and remediation of cloud misconfigurations.  CyberWire Glossary link: https://thecyberwire.com/glossary/cloud-security-posture-management Audio reference link: Josh Whedon. 2005. Serenity [Movie]. IMDb. URL https://www.imdb.com/title/tt0379786/

The online dating world is a jungle.

Season 6 · Episode 259

jeudi 14 septembre 2023Duration 50:00

Andrew Hendel, CEO at Marshmallo, joins to share tips to safeguard your feelings and identity in the online dating world. Dave and Joe share some listener follow up from Gareth, who writes in to discuss strange emails he has been receiving. Dave's story follows a woman who was spared jail time after being manipulated by hackers into money laundering. Joe's story is from listener Doug who wrote in to the show to talk about the site he is in charge of and discusses a website he uses called "Buy me a coffee," where his viewers can buy him a coffee, and how he has been experiencing some weird instances with the payment methods of that website. Our catch of the day comes from listener Brandyon who shares an interesting way he was offered to make $600 a week. Links to follow-up and stories: Woman 'manipulated' by hackers into money laundering Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.

Related Shows Based on Content Similarities

Discover shows related to Hacking Humans, based on actual content similarities. Explore podcasts with similar topics, themes, and formats, backed by real data.
Le Super Daily
Negotiations Ninja Podcast
Mind Pump: Raw Fitness Truth
Die Sitzung
Simple English News Daily
UnterBlog
nerdcafe. Der Podcast rund um WordPress, Hosting, CMS und Web.
Morrus’ Unofficial Tabletop RPG Talk
Word In Your Ear
La Cellule
© My Podcast Data
Podcast Hacking Humans by N2K Networks | My Podcast Data