
Hacking Humans
Technology Podcasts
Deception, influence, and social engineering in the world of cyber crime.
Location:
United States
Genres:
Technology Podcasts
Description:
Deception, influence, and social engineering in the world of cyber crime.
Language:
English
Website:
https://www.thecyberwire.com/
Episodes
Web Application Firewall (noun) [Word Notes]
3/3/2026
Please enjoy this encore of Word Notes. A layer seven firewall designed to block threats at the application layer of the open system interconnection model, the OSI model. CyberWire Glossary link: https://thecyberwire.com/glossary/web-application-firewall Audio reference link: “VCF East 9.1 - Ches' Computer Security Adventures - Bill Cheswick.” YouTube, 29 Dec. 2015, https://youtu.be/trR1cuBtcPs.
Duration:00:08:59
AI ate my homework.
2/26/2026
This week, hosts of N2K CyberWire Maria Varmazis and Dave Bittner alongside Joe Carrigan are discussing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Maria’s story covers a BBC experiment by Thomas Germain showing how easily major AI tools like ChatGPT and Google’s Gemini repeated a completely fabricated claim he posted online, highlighting what experts call a “renaissance for spam” as SEO-style manipulation resurfaces in the age of AI. Dave’s story examines Elizabeth Chamblee Burch’s book The Pain Brokers, which details how women with pelvic mesh implants were allegedly cold-called and steered into surgeries as part of a $40 million mass-tort recruitment scheme fueled by litigation finance and regulatory gaps. Joe’s story reports on an alleged decade-long ticket fraud ring at the Louvre in Paris, where tour guides and museum employees are accused of reusing tickets and bribery, costing more than €10 million before French authorities made multiple arrests. Our catch of the day comes from Reddit, where a user tested the limits of a land developer. Resources and links to stories: I hacked ChatGPT and Google's AI - and it only took 20 minutes A Terrifying Scam and the System That Made It Possible The Pain Brokers: How Con Men, Call Centers, and Rogue Doctors Fuel America's Lawsuit Factory Louvre tour guides accused of orchestrating $16m ticket fraud ring over a decade T&T&T Land&Sea Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.
Duration:00:51:39
COBIT (noun) [Word Notes]
2/24/2026
Please enjoy this encore of Word Notes. An IT governance framework developed by ISACA. CyberWire Glossary link: https://thecyberwire.com/glossary/cobit Audio reference link: isacappc. “How Do You Explain Cobit to Your Dad – or Your CEO?” YouTube, YouTube, 24 Aug. 2016, https://www.youtube.com/watch?v=EYATVkddIyw.
Duration:00:07:06
The voice on the other end.
2/19/2026
This week, hosts Maria Varmazis (also host of the T-Minus Space Daily show), Dave Bittner and Joe Carrigan are discussing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We have some follow up where Joe shares a scam call he received. Dave’s got the story on a sophisticated phishing campaign targeting Apple Pay users through fake emails and voice calls impersonating customer support, as well as Australia’s ClickFit initiative warning that romance scammers are exploiting trust online for emotional and financial gain. Joe’s story is about a former Ohio bank employee who used his insider access to steal identities and siphon roughly $2 million from elderly customers, ultimately leading to his arrest in Chicago and federal conviction. Maria’s story is about a daughter who discovers her 84-year-old mother has been financially exploited by trusted professionals and even family members, underscoring how elder fraud often comes from familiar faces. It highlights the rapid rise in elder financial abuse and the urgent need for families to step in early—before cognitive decline makes the losses irreversible. Our catch of the day come's from the "Australian Government" on a tax document being floated around. Resources and links to stories: Apple Pay Users Targeted by Sophisticated Phishing Scam Leveraging Voice and Email ClickFit: Romance scams Former Bank Employee Found Guilty of Targeting Elderly Victims in Identity Theft and Fraud Scheme Ohio bank’s anti-fraud agent stole $2M from elderly customers: DOJ Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.
Duration:00:45:43
Security Service Edge (SSE) (noun) [Word Notes]
2/17/2026
Please enjoy this encore of Word Notes. A security architecture that incorporates the cloud shared responsibility model, a vendor provided security stack, and network peering with one or more of the big content providers and their associated fiber networks. CyberWire Glossary link: https://thecyberwire.com/glossary/security-service-edge Audio reference link: Netskope (2022). What is Security Service Edge (SSE). YouTube. Available at: https://www.youtube.com/watch?v=Z9H84nvgBqw [Accessed 21 Oct. 2022].
Duration:00:08:17
Love was the hook.
2/12/2026
This week, hosts Maria Varmazis (also host of the T-Minus Space Daily show), Dave Bittner and Joe Carrigan are discussing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Dave sits down with Simon Horswell, a Senior Fraud Specialist at Entrust discussing evolving romance scams for Valentine's Day. We have some follow up on chickens and a listener write-in, with a quick note on the backyard chicken trend and a closer look at a Bank of America fraud text that looked like a phish. Maria’s story follows an alleged “Dubai Crown Prince” scam that drained nearly €3 million from a Romanian businesswoman using fake banks and humanitarian appeals. Joe’s story tells of a handyman-turned-boyfriend who ran multiple dating scams and stole from his partner and her family, now featured on Amazon Prime. Dave’s story features Simon Horswell from Entrust explaining why romance scams hit $4.5 billion in 2024 and how scammers use psychological tricks, AI tools, and celebrity impersonation to manipulate victims. We have two catches of the day this week, one a physical letter from the DOJ and the other is an email from Microsoft. Resources and links to stories: Let's stop shipping baby chickens in the mail Inside the alleged $2.5 million Dubai Crown Prince romance scam CASHED OUT I fell in love with a handyman who came to fix my kitchen – little did I know my fairytale would cost me £150k Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.
Duration:01:06:12
Domain spoofing (noun) [Word Notes]
2/10/2026
Please enjoy this encore of Word Notes. A social engineering tactic in which hackers build a malicious domain to mimic a legitimate one. CyberWire Glossary link: https://thecyberwire.com/glossary/domain-spoofing Audio reference link: “Mission Impossible Fallout - Hospital Scene.” YouTube, YouTube, 8 Oct. 2018,
Duration:00:07:55
Trust me, I’m legit.
2/5/2026
This week, while Maria Varmazis (also host of the T-Minus Space Daily show) is out at a conference, hosts Dave Bittner and Joe Carrigan are joined by friend of the show Michele Kellerman, as they are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Our hosts start with some follow-up on Joe’s egg story, including his latest update and a brief detour into unexpected “big chicken news.” Joe’s story is on a massive USDA loan fraud scheme where Nikesh Patel fabricated fake government-backed farm loans, duped investment firms out of hundreds of millions of dollars, and continued running similar scams under aliases and even from prison, ultimately earning decades more in sentencing. Michele’s story is on a breaking report about the ShinyHunters group using targeted voice phishing and custom phishing kits to abuse Okta SSO, steal MFA credentials, and gain privileged access for data theft and extortion. Dave’s story is on LastPass warning users about an active phishing campaign impersonating the company, designed to steal master passwords and potentially expose all credentials stored in affected vaults. Our catch of the day comes from the Reddit, where two people we're approached by scammers through text messaging and both dealt with their scammers in different ways. Resources and links to stories: Sticky Fingers: USDA Fraudster Steals $200M in Stunning Scam Formerly Married Couple Sentenced For Multi-Million Dollar Fraud Schemes A new wave of ‘vishing’ attacks is breaking into SSO accounts in real time LastPass Warns of Phishing Campaign Attempting to Steal Master Passwords Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.
Duration:00:51:19
When legit is the trick: Phishing’s sneaky new moves. [OMITB]
2/3/2026
Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by her co-hosts N2K Networks Dave Bittner and Keith Mularski, former FBI cybercrime investigator and now Chief Global Ambassador at Qintel. Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, our hosts discuss how attackers are increasingly abusing legitimate, trusted Microsoft workflows to make phishing campaigns more convincing and harder to spot. In device code phishing, victims are socially engineered into completing a real Microsoft OAuth login flow, inadvertently granting attackers valid access tokens without ever sharing a password. They also examined abuse of Microsoft 365 Direct Send, which allows threat actors to send phishing emails that appear to originate from inside an organization, reinforcing a broader shift toward weaponizing built-in cloud services rather than relying on obviously malicious infrastructure.
Duration:00:39:55
Secure Web Gateway (noun) [Word Notes]
2/3/2026
Please enjoy this encore of Word Notes. A layer seven firewall that sits in line at the boundary between the internet and an organization's network perimeter that allows security policy enforcement and can perform certain prevention and detection tasks. CyberWire Glossary link: https://thecyberwire.com/glossary/secure-web-gateway Audio reference link: Vintage Computer Federation (2015). VCF East 9.1 - Ches’ Computer Security Adventures - Bill Cheswick. YouTube. Available at: https://www.youtube.com/watch?v=trR1cuBtcPs.
Duration:00:09:22
Cold weather, hot scams.
1/29/2026
This week, hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Joe has two stories this week, starting with scammers cashing in on a Verizon outage by luring customers with fake credits, and ending with a rare cybercrime comeback as a woman who lost nearly $1 million gets her money back and then some. Dave’s story looks at scammers cashing in on the Ozempic and GLP-1 craze, as Wisconsin consumers lose hundreds of dollars to fake weight loss drugs, deepfake ads, and shady online pharmacies exploiting high demand and high prices. Maria’s story warns that scammers are impersonating electric, gas, and water companies this winter, using urgent threats, fake refunds, and unusual payment demands to steal money and personal information, while officials remind customers to hang up and verify any contacts through official channels. Our catch of the day comes from Reddit where the chief of police is reaching out via text. Resources and links to stories: Verizon credit scam targets customers after outage, Georgia sheriff says Cyber scam victim who lost nearly $1M gets her money back — and then some Surging Cyber Scams Leave Older Vermonters Destitute, Frustrated and Saddled With Tax Debt Wisconsin consumers are losing money on Ozempic, weight loss drug scams Winter Utilities warning Utility company warns customers about scam calls Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.
Duration:00:46:12
Indicators of Compromise (noun) [Word Notes]
1/27/2026
Please enjoy this encore of Word Notes. Digital evidence that a system or network has been breached. CyberWire Glossary link: https://thecyberwire.com/glossary/indicator-of-compromise Audio reference link: ”Suicide or Murder? | The Blind Banker | Sherlock,” uploaded by Sherlock, 18 October 2015
Duration:00:06:59
Scammers gonna scam.
1/22/2026
This week, hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Joe share's another chicken update for us, this time from Werner Herzog. Dave’s got a story from a listener named Tim, an IRS Criminal Investigation agent, who explains that real CI agents may contact people unannounced and can verify themselves in person, but if anyone asks for gift cards or crypto, it’s definitely a scam. Maria has the story on how attackers are abusing real SendGrid accounts to send politically charged phishing emails that look legitimate and trick users into handing over their credentials. Joe has two stories this week, the first on Cambodia’s renewed crackdown on massive Southeast Asian scam networks following the arrest and extradition of alleged kingpin Chen Zhi, signaling deeper international cooperation against fraud operations that have stolen billions worldwide, and the second on a Nashville Uber driver who lost $300 after falling for a convincing phone scam that impersonated Uber Support and falsely accused him of drunk driving. Our catch of the day comes from Reddit scams where one scammer gets put through the ringer, twice. Resources and links to stories: Cambodia to keep up crackdown on scam centres after arrest of alleged mastermind Uber driver describes drunk driving scam that cost him $300 SendGrid isn’t emailing you about ICE or BLM. It’s a phishing attack. Dave Part 1 Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.
Duration:00:47:02
Intrusion Detection System (noun) [Word Notes]
1/20/2026
Please enjoy this encore of Word Notes. A system that monitors for malicious or unwanted activity, and either raises alerts when such activity is detected or blocks the traffic from passing to the target. CyberWire Glossary link: https://thecyberwire.com/glossary/intrusion-detection-system Audio reference link: “Network Intrusion Detection and Prevention - CompTIA Security+ SY0-501 - 2.1,” Professor Messer, uploaded 16 November, 2017
Duration:00:07:47
When a scammer meets the Force.
1/15/2026
This week, while Maria Varmazis (also host of the T-Minus Space Daily show) is out, our hosts Dave Bittner and Joe Carrigan are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Joe starts us off with a chicken update. Joe’s story is on CrowdStrike’s 2025 Global Threat Report, which reveals faster-than-ever breakout times, a surge in vishing and initial access attacks, widespread abuse of valid accounts, and a growing shift toward malware-free intrusions as adversaries become more numerous and sophisticated. Dave’s got the story on how “pig-butchering” romance scams are industrialized, detailing Reuters’ reporting on cyberfraud gangs using step-by-step psychological playbooks to groom victims, manufacture emotional attachment, and rapidly funnel them into fake investments that leave lasting financial and emotional damage. Rishika Desai, Threat Researcher and Writer from Bfore.ai, joins Dave and Joe to discuss renting social media ad accounts for scamming purposes. Our catch of the day comes from Reddit, where one user channels their inner Jedi and uses the Force to send a pesky scammer retreating to the dark side. Resources and links to stories: A scammer’sblueprint CROWDSTRIKE 2025 GLOBAL THREAT REPORT Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.
Duration:00:51:13
MFA prompt bombing (noun) [Word Notes]
1/13/2026
Please enjoy this encore of Word Notes. Hackers bypass, multifactor authentication schemes by sending a blizzard of spamming login attempts until the accounts owner accepts the MFA prompt out of desperation to make the spamming stop. CyberWire Glossary link: https://thecyberwire.com/glossary/mfa-prompt-bombing Audio reference link: movieclips. “Sneakers (2/9) Movie Clip - Defeating the Keypad (1992) HD.” YouTube, YouTube, 29 May 2011, https://www.youtube.com/watch?v=oG5vsPJ5Tos.
Duration:00:06:47
It's just too good to be true.
1/8/2026
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow up on a big honor for Dave, recognized by SANS as a Difference Maker in Media—plus a quick chicken update, a newly named rooster, and construction officially getting underway on the new run. Maria has the story on a congressional warning about a surge in winter holiday travel scams, as fake booking sites and airline impersonators drive millions in losses during peak travel season. Dave has two stories this week, one on a friend who received a suspicious email appearing to come from the chair of a nonprofit, and the other on a BBC investigation uncovering how fraudulent crowdfunding campaigns exploited children with cancer and their families, siphoning off millions meant for life-saving treatment. Joe’s story covers a warning from the IRS on how to spot and avoid tax scams, highlighting red flags like too-good-to-be-true refunds, urgent threats, fake websites, and impersonators pressuring victims for money or personal information. For our Catch of the Day, it turns out Aquaman isn’t just ruling the seas — he’s apparently sliding into fans’ texts, proving once again that when a celebrity starts sounding a little too approachable, it’s probably not Hollywood calling. Resources and links to stories: ALERT: Winter Holidays Travel Scams Children with cancer scammed out of millions fundraised for their treatment, BBC finds Recognize tax scams and fraud How to know it's the IRS Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.
Duration:00:53:05
Apple Lockdown Mode (noun) [Word Notes]
1/6/2026
Please enjoy this encore of Word Notes. An optional security mode for macOS and iOS that reduces the attack surface of the operating system by disabling certain commonly attacked features. CyberWire Glossary link: https://thecyberwire.com/glossary/apple-lockdown-mode Audio reference link: “How NSO Group’s Pegasus Spyware Was Found on Jamal Khashoggi’s Fiancée’s Phone,” FRONTLINE, YouTube, 18 July 2021.
Duration:00:06:29
Poisoned at the source. [OMITB]
1/6/2026
Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by her co-hosts N2K Networks Dave Bittner and Keith Mularski, former FBI cybercrime investigator and now Chief Global Ambassador at Qintel. Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we dive into supply chain attacks through the lens of a massive Android malware campaign that infects devices before they ever reach users, embedding itself in firmware and reseller-installed system images. We connect the dots to other high-impact supply chain incidents—from SolarWinds to the recent F5 breach—and share new intelligence on Android devices compromised during manufacturing and distribution in China. Together, these cases highlight how attacks at the source can quietly scale, persist, and evade traditional defenses.
Duration:00:44:45
Hot sauce and hot takes: An Only Malware in the Building special.
1/1/2026
While our team is out on winter break, please enjoy this episode of Only Malware in the Building. Welcome in! You’ve entered, Only Malware in the Building — but this time, it’s not just another episode. This is a special edition you won’t want to miss. For the first time, our hosts are together in-studio — and they’re turning up the heat. Literally. Join Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED, along with N2K Networks Dave Bittner and Keith Mularski, former FBI cybercrime investigator and now Chief Global Ambassador at Qintel, as they take on a fiery hot wings challenge while answering personal questions about themselves, their careers, and the stories that shaped them. Think you’ve seen them tackle malware mysteries before? Wait until you see them sweat. This one’s too good for audio alone — you’ll want to watch the full video edition to catch every spicy reaction, every laugh, and maybe even a few tears. So grab your milk, get ready to feel the burn, and come join us for this special hot take on Only Malware in the Building.
Duration:00:36:37