Home
Categories
EXPLORE
Society & Culture
True Crime
Education
Business
History
Religion & Spirituality
Sports
About Us
Contact Us
Copyright
© 2024 PodJoint
Loading...
0:00 / 0:00
Podjoint Logo
QA
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts122/v4/bc/c0/58/bcc05881-65a5-ed60-2dc4-62c37113448d/mza_12180382533562040517.jpeg/600x600bb.jpg
Hacking Humans
N2K Networks
689 episodes
20 hours ago
Deception, influence, and social engineering in the world of cyber crime.
Show more...
Tech News
Technology,
News
RSS
All content for Hacking Humans is the property of N2K Networks and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Deception, influence, and social engineering in the world of cyber crime.
Show more...
Tech News
Technology,
News
https://megaphone.imgix.net/podcasts/a8d93330-55c8-11f0-801d-b7247f00ed4b/image/14002263e169460f16ca12e04624eb3a.png?ixlib=rails-4.3.1&max-w=3000&max-h=3000&fit=crop&auto=format,compress
The RMM protocol: Remote, risky, and ready to strike. [Only Malware in the Building]
Hacking Humans
41 minutes
1 month ago
The RMM protocol: Remote, risky, and ready to strike. [Only Malware in the Building]
Please enjoy this encore of Only Malware in the Building. Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is ⁠⁠Selena Larson⁠⁠, ⁠⁠Proofpoint⁠⁠ intelligence analyst and host of their podcast ⁠⁠DISCARDED⁠⁠. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by ⁠⁠N2K Networks⁠⁠ ⁠⁠Dave Bittner⁠⁠ and our newest co-host, ⁠Keith Mularski⁠, former FBI cybercrime investigator and now Chief Global Ambassador at ⁠Qintel⁠. Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, our hosts discuss the growing trend of cybercriminals using legitimate remote monitoring and management (RMM) tools in email campaigns as a first-stage payload. They explore how these tools are being leveraged for data theft, financial fraud, and lateral movement within networks. With the decline of traditional malware delivery methods, including loaders and botnets, the shift toward RMMs marks a significant change in attack strategies. Tune in to learn more about this evolving threat landscape and how to stay ahead of these tactics.
Hacking Humans
Deception, influence, and social engineering in the world of cyber crime.