Deception, influence, and social engineering in the world of cyber crime.
Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve my
Network observation systems designed to monitor globally unreachable but unused Internet address spa
This week Joe and Dave share some interesting follow up from a few episodes ago where Dave shared hi
A best practice for framing cyber intelligence critical information requirements that recommends col
Brandon Kovacs, a Senior Red Team Consultant at Bishop Fox, is talking about how Artificial Intellig
Also known as a third-party attack or a value-chain attack, advisory groups gain access to a targete
This week we are joined by Maria Varmazis, host of the N2K daily space show, T-Minus. Maria's story
The process of software engineers checking the flow of user input in application code to determine i
This week, we are joined by Dr. Chris Pierson CEO at Black Cloak, and he is talking about some of th
The process of stealing ATM customer credentials by means of physically and covertly installing one
This week we are joined by Maria Varmazis, host of the N2K daily space show, T-Minus. Maria shares a
A nation-state hacking group’s practice of funding its town activities through cybercrime or cyber m
This week, we are joined by host of 8th Layer Insights, Perry Carpenter from KnowBe4 and Dr. Jessica
A device connected to a network that accepts communications from other endpoints like laptops, mobil
An extension of the traditional Basic Input/Output System or BIOS that, during the boot process, fac
Bogdan Botezatu from Bitdefender is discussing research on "Audio deepfakes: Celebrity-endorsed give
An operating system program running in the background designed to perform a specific task when certa