
engelsk
Nyheder & politik
Begrænset tilbud
Derefter 99 kr. / månedOpsig når som helst.
Læs mere Hacking Humans
Deception, influence, and social engineering in the world of cyber crime.
Love was the hook.
This week, hosts Maria Varmazis [https://www.linkedin.com/in/varmazis/] (also host of the T-Minus [https://space.n2k.com/podcasts/t-minus?__hstc=223811332.a636bba53840b4700c929fe67723a129.1721054632698.1747145009569.1747159962459.413&__hssc=223811332.2.1747159962459&__hsfp=3690629108] Space Daily show), [https://www.linkedin.com/in/dave-bittner-27231a4/] Dave Bittner [https://www.linkedin.com/in/dave-bittner-27231a4/] and Joe Carrigan [https://www.linkedin.com/in/joecarrigan/] are discussing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Dave sits down with Simon Horswell [https://538d0b96.streak-link.com/CwmSgoMpaQzgubv8dwEjAYWz/https%3A%2F%2Fwww.linkedin.com%2Fin%2Fsimon-horswell-72b2052a%2F%3ForiginalSubdomain%3Duk], a Senior Fraud Specialist at Entrust [https://538d0b96.streak-link.com/CwmSgoM1dWw6IlY3Ug-9oKo1/https%3A%2F%2Fwww.entrust.com%2F] discussing evolving romance scams for Valentine's Day. We have some follow up on chickens and a listener write-in, with a quick note on the backyard chicken trend and a closer look at a Bank of America fraud text that looked like a phish. Maria’s story follows an alleged “Dubai Crown Prince” scam that drained nearly €3 million from a Romanian businesswoman using fake banks and humanitarian appeals. Joe’s story tells of a handyman-turned-boyfriend who ran multiple dating scams and stole from his partner and her family, now featured on Amazon Prime. Dave’s story features Simon Horswell from Entrust explaining why romance scams hit $4.5 billion in 2024 and how scammers use psychological tricks, AI tools, and celebrity impersonation to manipulate victims. We have two catches of the day this week, one a physical letter from the DOJ and the other is an email from Microsoft. Resources and links to stories: * Let's stop shipping baby chickens in the mail [https://www.wbur.org/cognoscenti/2026/02/03/hatcheries-chicks-backyard-coops-homesteaders-backyard-tove-danovich] * Inside the alleged $2.5 million Dubai Crown Prince romance scam [https://www.ghanaweb.com/GhanaHomePage/business/Inside-the-alleged-2-5-million-Dubai-Crown-Prince-romance-scam-2020297] * CASHED OUT I fell in love with a handyman who came to fix my kitchen – little did I know my fairytale would cost me £150k [https://www.thesun.co.uk/fabulous/37567733/romance-scammer-jason-porter-amazon-prime-documentary/] [https://www.ghanaweb.com/GhanaHomePage/business/Inside-the-alleged-2-5-million-Dubai-Crown-Prince-romance-scam-2020297]Have a Catch of the Day you'd like to share? Email it to us at [https://therecord.media/fin6-recruitment-scam-malware-campaign]hackinghumans@n2k.com [hackinghumans@n2k.com].
Domain spoofing (noun) [Word Notes]
Please enjoy this encore of Word Notes. A social engineering tactic in which hackers build a malicious domain to mimic a legitimate one. CyberWire Glossary link: https://thecyberwire.com/glossary/domain-spoofing [https://thecyberwire.com/glossary/domain-spoofing] Audio reference link: “Mission Impossible Fallout - Hospital Scene.” [https://www.youtube.com/watch?v=SOlmyv1WTBY] YouTube, YouTube, 8 Oct. 2018,
Trust me, I’m legit.
This week, while Maria Varmazis [https://www.linkedin.com/in/varmazis/] (also host of the T-Minus [https://space.n2k.com/podcasts/t-minus?__hstc=223811332.a636bba53840b4700c929fe67723a129.1721054632698.1747145009569.1747159962459.413&__hssc=223811332.2.1747159962459&__hsfp=3690629108] Space Daily show) is out at a conference, hosts [https://www.linkedin.com/in/dave-bittner-27231a4/] Dave Bittner [https://www.linkedin.com/in/dave-bittner-27231a4/] and Joe Carrigan [https://www.linkedin.com/in/joecarrigan/] are joined by friend of the show Michele Kellerman [https://www.linkedin.com/in/michele-kellerman-cissp-b2933378/], as they are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Our hosts start with some follow-up on Joe’s egg story, including his latest update and a brief detour into unexpected “big chicken news.” Joe’s story is on a massive USDA loan fraud scheme where Nikesh Patel fabricated fake government-backed farm loans, duped investment firms out of hundreds of millions of dollars, and continued running similar scams under aliases and even from prison, ultimately earning decades more in sentencing. Michele’s story is on a breaking report about the ShinyHunters group using targeted voice phishing and custom phishing kits to abuse Okta SSO, steal MFA credentials, and gain privileged access for data theft and extortion. Dave’s story is on LastPass warning users about an active phishing campaign impersonating the company, designed to steal master passwords and potentially expose all credentials stored in affected vaults. Our catch of the day comes from the Reddit, where two people we're approached by scammers through text messaging and both dealt with their scammers in different ways. Resources and links to stories: * Sticky Fingers: USDA Fraudster Steals $200M in Stunning Scam [https://www.agweb.com/news/sticky-fingers-usda-fraudster-steals-200m-stunning-scam] * Formerly Married Couple Sentenced For Multi-Million Dollar Fraud Schemes [https://www.justice.gov/usao-mdfl/pr/formerly-married-couple-sentenced-multi-million-dollar-fraud-schemes] * A new wave of ‘vishing’ attacks is breaking into SSO accounts in real time [https://cyberscoop.com/shinyhunters-voice-phishing-sso-okta-mfa-bypass-data-theft/] * LastPass Warns of Phishing Campaign Attempting to Steal Master Passwords [https://www.infosecurity-magazine.com/news/lastpass-phishing-master-passwords/] [https://therecord.media/fin6-recruitment-scam-malware-campaign]Have a Catch of the Day you'd like to share? Email it to us at [https://therecord.media/fin6-recruitment-scam-malware-campaign]hackinghumans@n2k.com [hackinghumans@n2k.com].
Secure Web Gateway (noun) [Word Notes]
Please enjoy this encore of Word Notes. A layer seven firewall that sits in line at the boundary between the internet and an organization's network perimeter that allows security policy enforcement and can perform certain prevention and detection tasks. CyberWire Glossary link: https://thecyberwire.com/glossary/secure-web-gateway [https://thecyberwire.com/glossary/secure-web-gateway] Audio reference link: Vintage Computer Federation (2015). VCF East 9.1 - Ches’ Computer Security Adventures - Bill Cheswick. YouTube. Available at: https://www.youtube.com/watch?v=trR1cuBtcPs. [https://www.youtube.com/watch?v=trR1cuBtcPs.]
When legit is the trick: Phishing’s sneaky new moves. [OMITB]
Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson [https://www.linkedin.com/in/selenalarson/], Proofpoint [https://www.proofpoint.com/] intelligence analyst and host of their podcast DISCARDED [https://www.proofpoint.com/us/podcasts/discarded]. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by her co-hosts N2K Networks [https://www.n2k.com/] Dave Bittner [https://www.linkedin.com/in/dave-bittner-27231a4/] and Keith Mularski [https://www.linkedin.com/in/keith-mularski-b737551/], former FBI cybercrime investigator and now Chief Global Ambassador at Qintel [https://www.linkedin.com/company/qintel/]. Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, our hosts discuss how attackers are increasingly abusing legitimate, trusted Microsoft workflows to make phishing campaigns more convincing and harder to spot. In device code phishing, victims are socially engineered into completing a real Microsoft OAuth login flow, inadvertently granting attackers valid access tokens without ever sharing a password. They also examined abuse of Microsoft 365 Direct Send, which allows threat actors to send phishing emails that appear to originate from inside an organization, reinforcing a broader shift toward weaponizing built-in cloud services rather than relying on obviously malicious infrastructure.
Vælg dit abonnement
Begrænset tilbud
Premium
20 timers lydbøger
Podcasts kun på Podimo
Gratis podcasts
Opsig når som helst
2 måneder kun 19 kr.
Derefter 99 kr. / måned
Premium Plus
100 timers lydbøger
Podcasts kun på Podimo
Gratis podcasts
Opsig når som helst
Prøv gratis i 7 dage
Derefter 129 kr. / måned
2 måneder kun 19 kr. Derefter 99 kr. / måned. Opsig når som helst.