Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
News
Sports
TV & Film
About Us
Contact Us
Copyright
© 2024 PodJoint
Podjoint Logo
US
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/e5/03/68/e503686f-ac22-691a-e0ae-5da38bfcb761/mza_5745578301893506626.jpg/600x600bb.jpg
Tech Overflow
Hannah Clayton-Langton and Hugh Williams
9 episodes
2 days ago
Send us a text A fake contractor calls the help desk, a password gets reset, and suddenly a national retailer has hackers inside. We open the door on the human side of hacking—how believable stories and helpful habits become the first domino—then trace the technical steps that turn a small foothold into a system‑wide crisis. We walk through the anatomy of the Marks & Spencer breach: social engineering as the entry point, slow‑burn privilege escalation, and the moment attackers reached th...
Show more...
Technology
Education,
Business
RSS
All content for Tech Overflow is the property of Hannah Clayton-Langton and Hugh Williams and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Send us a text A fake contractor calls the help desk, a password gets reset, and suddenly a national retailer has hackers inside. We open the door on the human side of hacking—how believable stories and helpful habits become the first domino—then trace the technical steps that turn a small foothold into a system‑wide crisis. We walk through the anatomy of the Marks & Spencer breach: social engineering as the entry point, slow‑burn privilege escalation, and the moment attackers reached th...
Show more...
Technology
Education,
Business
https://storage.buzzsprout.com/7zucj77dmslsqz1hf9yexw70mftk?.jpg
Hacking. Part #1: How A Retail Giant Fell to Ransomware
Tech Overflow
30 minutes
2 days ago
Hacking. Part #1: How A Retail Giant Fell to Ransomware
Send us a text A fake contractor calls the help desk, a password gets reset, and suddenly a national retailer has hackers inside. We open the door on the human side of hacking—how believable stories and helpful habits become the first domino—then trace the technical steps that turn a small foothold into a system‑wide crisis. We walk through the anatomy of the Marks & Spencer breach: social engineering as the entry point, slow‑burn privilege escalation, and the moment attackers reached th...
Tech Overflow
Send us a text A fake contractor calls the help desk, a password gets reset, and suddenly a national retailer has hackers inside. We open the door on the human side of hacking—how believable stories and helpful habits become the first domino—then trace the technical steps that turn a small foothold into a system‑wide crisis. We walk through the anatomy of the Marks & Spencer breach: social engineering as the entry point, slow‑burn privilege escalation, and the moment attackers reached th...