Enter the Troll Hole, the Comedy Podcast for Trolls, by Trolls. We comment on Recent News & Events, Discuss Trolls in All Varieties of Life, and Explore Philosophical Troll Topics & Conspiracies.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Sixth Door to the Left is a infrequently updated fiction anthology feed for short stories that needs to be told. Tone may vary greatly, as we ask the question: What’s behind door number 6? Sixth Door to the Left is a Divine Rodentia Studios production. Find out more about Divine Rodentia Studios
…
continue reading
Dr. Katz talks about medicine, women’s health and the ”sensitive subjects.” Essentially, nothing’s off limits!
…
continue reading
Fly fishing takes us to incredible places right in our back yard and across the world. We are here to tell the stories of those adventures.
…
continue reading
Down the Rabbit Hole is a podcast designed specifically for people that range from just thinking of getting into streaming and content creation to people that are experienced and need some motivation or advice.
…
continue reading
I shine some light (or mad ramblings) on topics that may interest me from murder, love, movies, being a mom, and whatever else I decide to word vomit about. Follow me down the rabbit hole, for we are all mad here. Join my group https://www.facebook.com/groups/sheddingskinandspillingtea/ Are you a photographer or a momtog? Check out my photographer resources community dont-lose-focus.com Support this podcast: https://podcasters.spotify.com/pod/show/sheddingskin/support
…
continue reading
As an A/P mechanic going on 16 years, I've worked on the largest and most complex aircraft in the world. But the reality of the industry can be surprising and even scary. I talk about the toxic and unsafe culture that aircraft mechanics REALLY deal with. The very things that airlines and aviation companies DON'T want you to know. Prepare yourself. The rabbit hole goes deep. Join me as I give you an inside look into the GOOD the BAD and the UGLY of Aviation Maintenance. Email: apmechanicpodca ...
…
continue reading
An acronym for Advanced Persistent Threat to describe hacker groups or campaigns normally, but not always, associated with nation state cyber espionage and continuous low-level cyber conflict operations.By N2K Networks
…
continue reading
1
Dr. Katz talks about her difficult but now successful weight loss journey
8:12
8:12
Play later
Play later
Lists
Like
Liked
8:12
Dr. Katz talks about the full picture of her weight loss journey.By Dr. Laura Katz
…
continue reading
1
Welcome to a new age in digital deception.
37:37
37:37
Play later
Play later
Lists
Like
Liked
37:37
This week, Maria Varmazis host of the N2K daily space show, T-Minus, joins Dave and Joe, as they celebrate Maria joining the Hacking Humans podcast every week! Maria's story is on supplement scams, as there has been a significant surge in health-related supplement scams on social media platforms, utilizing advanced technologies like AI-generated im…
…
continue reading
An undocumented or publicly unknown method to access a computer system undetected or to break a cypher used to encode messages.By N2K Networks
…
continue reading
1
The costly consequences of communication scams.
31:06
31:06
Play later
Play later
Lists
Like
Liked
31:06
This week Dave shares a story on Business email compromise (BEC) scams, and how they are a major threat, costing $26 billion annually. The story shares how it's crucial for employees to verify suspicious emails through a secondary channel and for companies to foster transparent communication to mitigate such risks. Joe shares two stories with us th…
…
continue reading
1
Encore: watering hole attack (noun) [Word Notes]
5:30
5:30
Play later
Play later
Lists
Like
Liked
5:30
From the intrusion kill chain model, a technique where the hacker compromises sites commonly visited by members of a targeted community in order to deliver a malicious payload to the intended victim.By N2K Networks
…
continue reading
Listen to The Mystery Frequency: https://redcircle.com/shows/42a3f92e-93e6-412b-bd0b-3c117bc81993 An assassin rides the elevator to the next job, but will he even get that far? Content Warning: Death, discordant and loud noises Transcripts CAST: Brady Flanagan as the assassin PRODUCTION: Written by: Brady Flanagan Directed by: Brady Flanagan Sound …
…
continue reading
Blair Cohen from AuthenticID joins Dave to discuss how generative AI and authentication go hand in hand. Joe and Dave share some follow up from listener Robert who discusses an ad for a device that uses ChatGPT to record phone calls on your device. Dave helps his dad out with his computer and shares the tale. Dave also shares a story this week on t…
…
continue reading
1
Operation Endgame: The ultimate troll patrol. [Only Malware in the Building]
28:34
28:34
Play later
Play later
Lists
Like
Liked
28:34
Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K …
…
continue reading
1
Encore: network telescope (noun) [Word Notes]
5:18
5:18
Play later
Play later
Lists
Like
Liked
5:18
Network observation systems designed to monitor globally unreachable but unused Internet address space or the Deep Web in order to study a wide range of interesting Internet phenomena.By N2K Networks
…
continue reading
This week Joe and Dave share some interesting follow up from a few episodes ago where Dave shared his love for baby grand pianos and how scammers we're using that to lure people into traps. Listener George wrote in to share about a show on UK Channel 4, called "The Piano," it's a music competition where visitors play a public piano in a train stati…
…
continue reading
A best practice for framing cyber intelligence critical information requirements that recommends collecting and consolidating data from three specific sources: endpoint, network and log.By N2K Networks
…
continue reading
Dr. Katz describes the deep impact of not spending vacation in a hospital or facing an awful medical diagnosis.By Dr. Laura Katz
…
continue reading
Brandon Kovacs, a Senior Red Team Consultant at Bishop Fox, is talking about how Artificial Intelligence is shaping the future of social engineering. Listener Adina wrote in to share their thoughts on an earlier episode on Google. Dave share's listener Tony's write in for his story this week. Joe and Dave discuss some questions Tony shared about pr…
…
continue reading
1
Encore: supply chain attacks (noun) [Word Notes]
5:28
5:28
Play later
Play later
Lists
Like
Liked
5:28
Also known as a third-party attack or a value-chain attack, advisory groups gain access to a targeted victims network by first infiltrating a business partner's network that has access to the victim's systems or data.By N2K Networks
…
continue reading
This week we are joined by Maria Varmazis, host of the N2K daily space show, T-Minus. Maria's story covers the escalating efforts of pro-Russian propagandists to tarnish the Paris Summer Olympics and erode Western support for Ukraine, employing bold tactics like using AI to mimic Tom Cruise's voice. Joe and Dave share quite a bit of listener follow…
…
continue reading
Dr. Katz discusses the non impact of rude comments on her videosBy Dr. Laura Katz
…
continue reading
The process of software engineers checking the flow of user input in application code to determine if unanticipated input can affect program execution in malicious ways.By N2K Networks
…
continue reading
https://divinerodentiastudios.transistor.fm/about-credits#ep3Listen to The Devil's Plaything from our friends at Tlacuache Theatre: https://open.spotify.com/show/0wcLn0JfIawjMpKnRJ6lNv A Troll is awakened by construction for the third time this week, and ponders how to co-exist with the humanity of the modern world… Transcripts CAST: W. Keith Tims …
…
continue reading
1
kinda interesting how much lower your expectations get the more crappy stuff happens to you
1:26
1:26
Play later
Play later
Lists
Like
Liked
1:26
Dr. Katz describes how her expectations have changed with all she has been throughBy Dr. Laura Katz
…
continue reading
1
Spotting social engineering in the shadows.
1:01:21
1:01:21
Play later
Play later
Lists
Like
Liked
1:01:21
This week, we are joined by Dr. Chris Pierson CEO at Black Cloak, and he is talking about some of the social engineering attacks his team is tracking. Joe's story follows how Microsoft Threat Intelligence has observed the financially motivated cybercriminal group Storm-1811 misusing the client management tool Quick Assist in social engineering atta…
…
continue reading
1
The curious case of the missing IcedID. [Only Malware in the Building]
21:58
21:58
Play later
Play later
Lists
Like
Liked
21:58
Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K …
…
continue reading
The process of stealing ATM customer credentials by means of physically and covertly installing one or more devices onto a public ATM machine.By N2K Networks
…
continue reading
1
Guess what? Self care and selfish are not synonymous terms
2:15
2:15
Play later
Play later
Lists
Like
Liked
2:15
By Dr. Laura Katz
…
continue reading
Dr. Katz is hoping for discharge soon!By Dr. Laura Katz
…
continue reading
This week we are joined by Maria Varmazis, host of the N2K daily space show, T-Minus. Maria shares an interesting story from a listener, who writes in on an AirBnB debacle he was dealing with. Joe shares the newly released 2024 Data Breach Investigations Report from Verizon. Dave shares a story From the New York Magazine, written by Ezra Marcus, on…
…
continue reading
1
I gotta concentrate on living right now and getting home where I belong
5:24
5:24
Play later
Play later
Lists
Like
Liked
5:24
Dr. Katz talk about her stem cell process and doctor patient relationshipsBy Dr. Laura Katz
…
continue reading
A nation-state hacking group’s practice of funding its town activities through cybercrime or cyber mercenary work.By N2K Networks
…
continue reading
This week, we are joined by host of 8th Layer Insights, Perry Carpenter from KnowBe4 and Dr. Jessica Barker from Cygenta to discuss human risk: awareness, behavior and beyond. Joe and Dave share some listener follow up, the first being from Richard, who writes in to share some tips and tricks regarding relationship scams mentioned in a previous sho…
…
continue reading
A device connected to a network that accepts communications from other endpoints like laptops, mobile devices, IoT equipment, routers, switches, and any tool on the security stack.By N2K Networks
…
continue reading
This week we are joined by Maria Varmazis, host of the N2K daily space show, T-Minus. Maria shares an interesting story about how ransomware infections are beginning to change to form a more psychological attack against victims' organizations, as criminals are using personal and aggressive tactics to force them to pay. Dave and Joe share some liste…
…
continue reading
1
Encore: unified extensible firmware interface (UEFI) (noun) [Word Notes]
5:56
5:56
Play later
Play later
Lists
Like
Liked
5:56
An extension of the traditional Basic Input/Output System or BIOS that, during the boot process, facilitates the communication between the computer’s firmware and the computer’s operating system.By N2K Networks
…
continue reading
Bogdan Botezatu from Bitdefender is discussing research on "Audio deepfakes: Celebrity-endorsed giveaway scams and fraudulent investment opportunities flood social media platforms." Dave and Joe shares some follow up from listener Lara, who writes in to discuss a few topics regarding a previous episode. Joe's story is sharing a game changer in the …
…
continue reading
An operating system program running in the background designed to perform a specific task when certain conditions or events occur.By N2K Networks
…
continue reading
This week we are joined by Maria Varmazis, host of the N2K daily space show, T-Minus. Maria shares an interesting story from Canada on a gentleman who thought he was calling Best Buy's Geek Squad, but instead ended up getting scammed out of $25,000. Dave and Joe share quite a bit of listener follow up, the first one is from Raul who shares how they…
…
continue reading
Also known as spyware and adware, it is a software category where developers design the application neither to cause explicit harm nor to accomplish some conventional legitimate purpose, but when run, usually annoys the user and often performs actions that the developer did not disclose, and that the user regards as undesirable.…
…
continue reading
In January 2024 an indentation in the asphalt shaped like a rat mysteriously appeared in Chicago. All traces of the once great city have vanished, save for these news broadcasts following the events that led to the city’s destruction… Content Warnings: Mind control Apocalyptic Depictions Loud noises Depictions of Rats Cult like Behavior mentioning …
…
continue reading
Roger Grimes, a Data Driven Defense Evangelist from KnowBe4 and author is discussing his new book, "Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing." Dave and Joe share some listener follow up, the first being from listener Tim, who shares a story of him almost falling for a scam involving some of his investment as…
…
continue reading
An automatic software bug and vulnerability discovery technique that inputs invalid, unexpected and/or random data or fuzz into a program and then monitors the program's reaction to it.By N2K Networks
…
continue reading
1
Is change presenting a window of opportunity for attackers?
1:04:22
1:04:22
Play later
Play later
Lists
Like
Liked
1:04:22
Trevin Edgeworth, Red Team Practice Director at Bishop Fox, is discussing how change, like M&A, staff, tech, lack of clarity or even self-promotion within and around security environments presents windows of opportunity for attackers. Joe and Dave share some listener follow up, the first one comes from Erin, who writes in from Northern Ireland, sha…
…
continue reading
A family of multitasking, multi-user computer operating systems that derive from the original Unix system built by Ken Thompson and Dennis Ritchie in the 1960s.By N2K Networks
…
continue reading
Divine Rodentia Studios Presents: Sixth Door to the Left, a infrequently updated anthology feed for short stories that cannot fit anywhere else. Transcripts For all things Divine Rodentia Studios you can use our website This has been a production by Divine Rodentia Studios, copyright 2024 ★ Support this podcast ★…
…
continue reading
Dr. Robert Blumofe, CTO at Akamai, sits down to talk about the AI doomsday versus a "very bad day" scenario. Dave shares a story from The Knowledge Project Podcast, where the host talks to Adam Robinson, a multifaceted individual known for his work as an author, educator, entrepreneur, and hedge fund advisor, and he talks about what is all incorpor…
…
continue reading
1
Encore: deep packet inspection (DPI) (noun) [Word Notes]
5:34
5:34
Play later
Play later
Lists
Like
Liked
5:34
A network monitoring and filtering technique that examines both the header information and the payload of every packet traversing a network access point.By N2K Networks
…
continue reading
1
Cyber crime chronicles featuring scams, spies, and cartel schemes.
46:32
46:32
Play later
Play later
Lists
Like
Liked
46:32
This week we are joined by Maria Varmazis, host of the N2K daily space show, T-Minus. Maria shares an interesting story about Apple users reporting that they are being targeted in elaborate phishing attacks that involve's a bug in Apple’s password reset feature. Joe and Dave share some listener follow up from Leo who shares some thoughts on episode…
…
continue reading
A clandestine set of applications designed to give hackers access and control over a target device.By N2K Networks
…
continue reading
Dr. Katz describes why she feels blessed despite everything that has happened to her.By Dr. Laura Katz
…
continue reading
1
Exploring emerging trends in online scamming.
1:00:43
1:00:43
Play later
Play later
Lists
Like
Liked
1:00:43
Graham Cluley joins to discuss trends he’s been seeing lately in online scams. N2K's very own Gina Johnson shares some insights on a discussion a few episode ago on why people need a prescription for oxygen in the US. Joe brings up the topic of getting and exploiting access to your infrastructure, and shares an article that deals with the rise of s…
…
continue reading
1
Encore: tactics, techniques and procedures (TTPs) (noun) [Word Notes]
6:43
6:43
Play later
Play later
Lists
Like
Liked
6:43
A set of behaviors that precisely describes a cyber adversary attack campaign.By N2K Networks
…
continue reading