N2K Networks

Hacking Humans

Discover the tactics of deception and manipulation used in cyber crime, revealing how influence shapes our interactions in the digital landscape.

Listen on Apple Podcasts

OWASP identification and authentication failures (noun) [Word Notes]

S2 E84 • 6 mins • May 20, 2025

Recent Episodes

May 20, 2025

OWASP identification and authentication failures (noun) [Word Notes]

S2 E84 • 6 mins

May 15, 2025

The band is finally back together.

S8 E338 • 44 mins

May 13, 2025

Log4j vulnerability (noun) [Word Notes]

S2 E83 • 9 mins

May 8, 2025

What’s inside the mystery box? Spoiler: It’s a scam!

S8 E337 • 46 mins

May 6, 2025

The RMM protocol: Remote, risky, and ready to strike. [OMITB]

S1 E12 • 42 mins

Language
English
Country
United States
Feed Host
Request an Update
Updates may take a few minutes.