Hacking Humans
المدة الإجمالية:
18 h 54 min
Lock your doors and check your URLs.
Hacking Humans
42:56
Intrusion Kill Chain (noun) [Word Notes]
Hacking Humans
07:46
The new weapon in text scams.
Hacking Humans
41:40
Identity Orchestration (noun) [Word Notes]
Hacking Humans
06:16
Scammers are recruiting.
Hacking Humans
46:05
Diamond Model (noun) [Word Notes]
Hacking Humans
07:47
How little data reveals a lot.
Hacking Humans
48:47
MITRE ATT&CK (noun) [Word Notes]
Hacking Humans
07:43
When your AI gets scammed.
Hacking Humans
43:57
Hot sauce and hot takes: An Only Malware in the Building special. [OMITB]
Hacking Humans
36:37
DevOps (noun) [Word Notes]
Hacking Humans
07:30
Social engineering served sunny-side up.
Hacking Humans
48:57
Waterfall Software Development Method (noun) [Word Notes]
Hacking Humans
06:25
Scammers hit the right notes in the wrong way.
Hacking Humans
49:06
Agile Software Development Method (noun) [Word Notes]
Hacking Humans
07:45
This scam is now in session.
Hacking Humans
45:05
Pegasus (noun) [Word Notes]
Hacking Humans
08:45
Yeti or not, it’s a scam.
Hacking Humans
50:20
Work from home, malware included. [OMITB]
Hacking Humans
32:14
Domain-based Message Authentication Reporting Conformance (DMARC) (noun) [Word Notes]
Hacking Humans
08:27
Click for a pay bump?
Hacking Humans
30:17
Shields Up (noun) [Word Notes]
Hacking Humans
07:46
The delusional side of AI therapy.
Hacking Humans
51:54
Software Assurance Maturity Model (SAMM) (noun) [Word Notes]
Hacking Humans
05:43
It’s all glitter, no gold.
Hacking Humans
47:13
Universal 2nd Factor (U2F) (noun) [Word Notes]
Hacking Humans
07:17
Convinced, compromised, and confirmed.
Hacking Humans
51:16
adversary group naming (noun) [Word Notes]
Hacking Humans
10:17
Brushed aside: The subtle scam you didn't order.
Hacking Humans
44:00
The RMM protocol: Remote, risky, and ready to strike. [Only Malware in the Building]
Hacking Humans
39:25
BSIMM (noun) [Word Notes]
Hacking Humans
06:09
The many faces of fraud.
Hacking Humans
41:58
OWASP vulnerable and outdated components (noun) [Word Notes]
Hacking Humans
08:04
Gold bars and bold lies.
Hacking Humans
45:57
Managing online security throughout the decades.
Hacking Humans
43:09
OWASP software and data integrity failures (noun) [Word Notes]
Hacking Humans
08:27
No cameras, no crew—just code.
Hacking Humans
46:33
The great CoGUI caper. [OMITB]
Hacking Humans
35:20
OWASP server-side request forgery (noun) [Word Notes]
Hacking Humans
07:38
Lights, camera, scam!
Hacking Humans
41:49