548 episódios

Deception, influence, and social engineering in the world of cyber crime.

Hacking Humans N2K Networks

    • Tecnologia
    • 5,0 • 3 classificações

Deception, influence, and social engineering in the world of cyber crime.

    Encore: taint analysis (noun) [Word Notes]

    Encore: taint analysis (noun) [Word Notes]

    The process of software engineers checking the flow of user input in application code to determine if unanticipated input can affect program execution in malicious ways.

    • 4 min
    Spotting social engineering in the shadows.

    Spotting social engineering in the shadows.

    This week, we are joined by Dr. Chris Pierson CEO at Black Cloak, and he is talking about some of the social engineering attacks his team is tracking. Joe's story follows how Microsoft Threat Intelligence has observed the financially motivated cybercriminal group Storm-1811 misusing the client management tool Quick Assist in social engineering attacks. Dave share's the story of the lure of a free baby grand piano to deceive over 125,000 email recipients, mainly targeting North American university students and faculty, earning at least $900,000. Our catch of the day comes from listener Chuck who writes in to share some of his junk mail he has been receiving recently, and shares concerns for other listeners.
    Please take a moment to fill out an audience survey! Let us know how we are doing!
    Links to the stories:

    Threat actors misusing Quick Assist in social engineering attacks leading to ransomware

    Free Piano phish targets American university students, staff


    Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.

    • 1h 1m
    The curious case of the missing IcedID. [Only Malware in the Building]

    The curious case of the missing IcedID. [Only Malware in the Building]

    Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K Networks Dave Bittner and Rick Howard to uncover the stories behind notable cyberattacks. 
    Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we talk about "The curious case of the missing IcedID."
    IcedID is a malware originally classified as a banking trojan and was first observed in 2017. It also acts as a loader for other malware, including ransomware, and was a favored payload used by multiple cybercriminal threat actors until fall 2023.
    Then, it all but disappeared. In its place, a new threat crawled: Latrodectus. Named after a spider, this new malware, created by the same people as IcedID, is now poised to take over where IcedID melted off.
    Today we look back at what happened to the once prominent payload, and what its successor’s spinning web of activity means for the overall landscape.

    • 21 min
    Encore: ATM skimming (noun) [Word Notes]

    Encore: ATM skimming (noun) [Word Notes]

    The process of stealing ATM customer credentials by means of physically and covertly installing one or more devices onto a public ATM machine.

    • 4 min
    The AirBnB booking that wasn’t.

    The AirBnB booking that wasn’t.

    This week we are joined by Maria Varmazis, host of the N2K daily space show, T-Minus. Maria shares an interesting story from a listener, who writes in on an AirBnB debacle he was dealing with. Joe shares the newly released 2024 Data Breach Investigations Report from Verizon. Dave shares a story From the New York Magazine, written by Ezra Marcus, on a college sophomore from University of Miami who was found to be tangled up in a refund fraud scam that granted him a lavish lifestyle. Our catch of the day comes from Joe's mother this week. She happened to receive an email with the subject line being "your order is confirmed," coming from what looks to be "McAfee."
    Please take a moment to fill out an audience survey! Let us know how we are doing!
    Links to the stories:

    The Package King of Miami

    2024 Data Breach Investigations Report


    You can hear more from the T-Minus space daily show here.
    Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com.

    • 51 min
    Encore: APT side hustle (noun) [Word Notes]

    Encore: APT side hustle (noun) [Word Notes]

    A nation-state hacking group’s practice of funding its town activities through cybercrime or cyber mercenary work.

    • 5 min

Críticas de clientes

5,0 de 5
3 classificações

3 classificações

Top de podcasts em Tecnologia

Apple Events (video)
Apple
O Futuro do Futuro
Hugo Séneca
Acquired
Ben Gilbert and David Rosenthal
IA: A Próxima Vaga
Francisco Pinto Balsemão
Lex Fridman Podcast
Lex Fridman
Da Inteligência ao Artificial
Bauer Media Audio Portugal

Talvez também goste

CyberWire Daily
N2K Networks
Malicious Life
Malicious Life
Smashing Security
Graham Cluley & Carole Theriault
Hacked
Hacked
Cyber Security Headlines
CISO Series
Cybersecurity Today
ITWC