Send us a text A fake contractor calls the help desk, a password gets reset, and suddenly a national retailer has hackers inside. We open the door on the human side of hacking—how believable stories and helpful habits become the first domino—then trace the technical steps that turn a small foothold into a system‑wide crisis. We walk through the anatomy of the Marks & Spencer breach: social engineering as the entry point, slow‑burn privilege escalation, and the moment attackers reached th...
All content for Tech Overflow is the property of Hannah Clayton-Langton and Hugh Williams and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Send us a text A fake contractor calls the help desk, a password gets reset, and suddenly a national retailer has hackers inside. We open the door on the human side of hacking—how believable stories and helpful habits become the first domino—then trace the technical steps that turn a small foothold into a system‑wide crisis. We walk through the anatomy of the Marks & Spencer breach: social engineering as the entry point, slow‑burn privilege escalation, and the moment attackers reached th...
Send us a text What happens when a search engine is driven by a text file of hand-written rules? You get a Jaguar car ranking first for an iPod query on eBay, and you get the perfect setup for a practical tour of how AI actually creates value. We unpack the journey from brittle if-then logic to machine learning that learns relevance from real outcomes. In this episode, we break down AI, machine learning, and large language models (LLMs) in clear terms, showing how they fit together and where...
Tech Overflow
Send us a text A fake contractor calls the help desk, a password gets reset, and suddenly a national retailer has hackers inside. We open the door on the human side of hacking—how believable stories and helpful habits become the first domino—then trace the technical steps that turn a small foothold into a system‑wide crisis. We walk through the anatomy of the Marks & Spencer breach: social engineering as the entry point, slow‑burn privilege escalation, and the moment attackers reached th...