Hacking Humans
A podcast by N2K Networks
Categories:
591 Episodes
-
A blurring of lines between nation states and criminals.
Published: 24/02/2022 -
OWASP server-side request forgery (noun) [Word Notes]
Published: 22/02/2022 -
Hustling the hustlers. [Hacking Humans Goes to the Movies]
Published: 20/02/2022 -
Vulnerabilities will be found.
Published: 17/02/2022 -
OWASP security logging and monitoring failures (noun) [Word Notes]
Published: 15/02/2022 -
If you wish for peace, prepare for cyberwar.
Published: 10/02/2022 -
OWASP identification and authentication failures (noun) [Word Notes]
Published: 8/02/2022 -
How to talk your way in anywhere. [Hacking Humans Goes to the Movies]
Published: 6/02/2022 -
The ransomware game has evolved.
Published: 3/02/2022 -
OWASP broken access control (noun) [Word Notes]
Published: 1/02/2022 -
Useful ransomware protection for you.
Published: 27/01/2022 -
OWASP security misconfiguration (noun) [Word Notes]
Published: 25/01/2022 -
The perfect environment for ATOs (account takeovers) to breed.
Published: 20/01/2022 -
OWASP insecure design (noun)
Published: 18/01/2022 -
The only locks you should pick are your own.
Published: 13/01/2022 -
Log4j vulnerability (noun) [Word Notes]
Published: 11/01/2022 -
Changing the game on ransomware.
Published: 6/01/2022 -
OWASP injection (noun) [Word Notes]
Published: 4/01/2022 -
Identity "protection" and a pigeon drop. [Hacking Humans Goes to the Movies]
Published: 30/12/2021 -
Encore: zero trust (noun) [Word Notes]
Published: 28/12/2021
Deception, influence, and social engineering in the world of cyber crime.