A podcast by Paessler all about monitoring IT, IoT, OT...and everything in between. Get monitoring deep dives, best practices, industry trends, and more from experts in the monitoring field. Let's get monitoring!
…
continue reading
Ot Monitoring Podcasts
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Felix explores Internet of Things (IoT) and Operational Technology cyber security. Perfect for project managers, developers, and those learning about penetration testing in this niche area. Email Felix using [email protected] Get more information at the website: yougottahackthat.com Find You Gotta Hack That on LinkedIn and X @gotta_hack
…
continue reading
Join HOU.SEC.CON Cofounders Michael and Sam each week as they chat with conference speakers about the latest topics and trends in the cybersecurity space.
…
continue reading
Welcome to On The air, a podcast for individuals interested in learning about the profession of occupational therapy. Through interviews and dialogue on each episode of the show, we will explore topics, exchange ideas, become better informed, and gain a dose of inspiration as we talk about topics and ideas related to the field of OT.
…
continue reading

1
Brushed aside: The subtle scam you didn't order.
44:00
44:00
Play later
Play later
Lists
Like
Liked
44:00This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are back sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow up, as Joe shares with us a compl…
…
continue reading

1
The RMM protocol: Remote, risky, and ready to strike. [Only Malware in the Building]
41:25
41:25
Play later
Play later
Lists
Like
Liked
41:25Please enjoy this encore of Only Malware in the Building. Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a buil…
…
continue reading
Please enjoy this encore of Word Notes. A descriptive model that provides a baseline of observed software security initiatives and activities from a collection of volunteer software development shops. CyberWire Glossary link: https://thecyberwire.com/glossary/bsimm Audio reference link: “OWASP AppSecUSA 2014 - Keynote: Gary McGraw - BSIMM: A Dec…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are back sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow-up from listener Abdussobur, who wonders if…
…
continue reading
We’re back with another keynote speaker, Robert “RSnake” Hansen! He chats with Michael and Sam about his new book, AI’s Best Friend (and how to get a free copy!), how he started hacking, and his upcoming HOU.SEC.CON. presentation around his research on the CVSS framework. Things Mentioned: · HSC User Group on June 26, 2025 – https://www.hscusergrou…
…
continue reading

1
OWASP vulnerable and outdated components (noun) [Word Notes]
8:04
8:04
Play later
Play later
Lists
Like
Liked
8:04Please enjoy this encore of Word Notes. Software libraries, frameworks, packages, and other components, and their dependencies (third-party code that each component uses) that have inherent security weaknesses, either through newly discovered vulnerabilities or because newer versions have superseded the deployed version. Audio reference Link: "The…
…
continue reading
Please enjoy this encore of Hacking Humans. On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there…
…
continue reading

1
Managing online security throughout the decades.
43:09
43:09
Play later
Play later
Lists
Like
Liked
43:09This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start off with some more chicken follow up, this week, delving into malware-relat…
…
continue reading

1
The Never-Ending Cat and Mouse Game with Dmitri Alperovitch
36:12
36:12
Play later
Play later
Lists
Like
Liked
36:12Michael and Sam are back with another HOU.SEC.CON. keynote speaker – Dmitri Alperovitch! In this episode they talk about his new book, what he’s been up to since CrowdStrike, and what will be covered in his opening keynote. Things Mentioned: HSC User Group on June 26, 2025 – https://www.hscusergroup.com TAB Cyber Foundation Scholarship Closing July…
…
continue reading

1
OWASP software and data integrity failures (noun) [Word Notes]
8:27
8:27
Play later
Play later
Lists
Like
Liked
8:27Please enjoy this encore of Word Notes. Code and data repositories that don't protect against unauthorized changes.By N2K Networks
…
continue reading
This week, our hosts Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow-up from a listener on class action settlements: they’re a class action attorney …
…
continue reading
Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is jo…
…
continue reading

1
OWASP server-side request forgery (noun) [Word Notes]
7:38
7:38
Play later
Play later
Lists
Like
Liked
7:38Please enjoy this encore of Word Notes. An attack technique that leverages an unprotected web server as a proxy for attackers to send commands through to other computers.By N2K Networks
…
continue reading
This week, our three hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with a bit of follow up, one from listener Aaron, who shares some safety tips fo…
…
continue reading

1
Forcing Innovation with Jeremiah Grossman
43:19
43:19
Play later
Play later
Lists
Like
Liked
43:19HOU.SEC.CON.'s first keynote speaker is returning for our 15-year anniversary! This week Michael and Sam are talking to cybersecurity legend Jeremiah Grossman about his start in cyber at just 19 years old, what we can learn from cybersecurity insurance companies, and what to expect at HOU.SEC.CON. 2025! Things Mentioned: · What Works in Cybersecuri…
…
continue reading

1
OWASP security logging and monitoring failures (noun) [Word Notes]
6:04
6:04
Play later
Play later
Lists
Like
Liked
6:04Please enjoy this encore of Word Notes. The absence of telemetry that could help network defenders detect and respond to hostile attempts to compromise a system.By N2K Networks
…
continue reading
This week, our three hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Listener Jim notes that money launderers and couriers mentioned in recent episodes are often scam…
…
continue reading

1
OWASP identification and authentication failures (noun) [Word Notes]
5:58
5:58
Play later
Play later
Lists
Like
Liked
5:58Please enjoy this encore of Word Notes. Ineffectual confirmation of a user's identity or authentication in session management. CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-identification-and-authentication-failure Audio reference link: “Mr. Robot Hack - Password Cracking - Episode 1.” YouTube Video. YouTube, September 21, 20…
…
continue reading
And....we're back! This week, our three hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are all back to share the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. The team shares three bits of follow-up and then breaks into their stories. Joe star…
…
continue reading

1
OT Security with Watch Mr. Wizard Star Sean Curry
32:13
32:13
Play later
Play later
Lists
Like
Liked
32:13Michael and Sam are catching up with Principal Consultant and Co-Founder at Cavalry Solutions, Sean Curry! Sean talks about his transition from the military to the private sector, the importance of standards like IEC 62443 for OT security, and the best way to align IT and OT teams. Things Mentioned: · New study reveals 92% of industrial sites at ri…
…
continue reading
Please enjoy this encore of Word Notes. An open source Java-based software tool available from the Apache Software Foundation designed to log security and performance information. CyberWire Glossary link: https://thecyberwire.com/glossary/log4j Audio reference link: “CISA Director: The LOG4J Security Flaw Is the ‘Most Serious’ She’s Seen in Her …
…
continue reading

1
What’s inside the mystery box? Spoiler: It’s a scam!
46:13
46:13
Play later
Play later
Lists
Like
Liked
46:13As Dave Bittner is at the RSA Conference this week, our hosts Maria Varmazis and Joe Carrigan, are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow-up from José on episode 335, sharing how UK banking features like Faster Payments and the “Check Payee” …
…
continue reading
In this episode, Felix and Alex discuss the alarming rise of phone thefts in London, sharing personal anecdotes and insights into the implications of losing a device. They explore security measures, user behaviors, and the broader impact of identity theft in today's digital age. The conversation emphasizes the importance of enhancing phone security…
…
continue reading

1
OWASP broken access control (noun) [Word Notes]
7:30
7:30
Play later
Play later
Lists
Like
Liked
7:30Please enjoy this encore of Word Notes. Software users are allowed access to data or functionality contrary to the defined zero trust policy by bypassing or manipulating the installed security controls.By N2K Networks
…
continue reading

1
The RMM protocol: Remote, risky, and ready to strike. [OMITB]
41:40
41:40
Play later
Play later
Lists
Like
Liked
41:40Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined b…
…
continue reading
As Maria is on vacation this week, our hosts Dave Bittner and Joe Carrigan, are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Joe and Dave are joined by guest Rob Allen from ThreatLocker who shares a story on how a spoofed call to the help desk unraveled into a full-blown cybe…
…
continue reading

1
Predicting the Future of Malware with Dr. Marcus Botacin
35:21
35:21
Play later
Play later
Lists
Like
Liked
35:21In this episode Michael and Sam are talking to malware researcher Dr. Marcus Botacin. Dr. Botacin discusses his journey from early work in sandboxing to advanced malware detection through machine learning, his recent efforts combining LLMs with GANs to create an iterative malware generation system that enhances evasion capabilities, and the importa…
…
continue reading

1
OWASP security misconfiguration (noun) [Word Notes]
7:03
7:03
Play later
Play later
Lists
Like
Liked
7:03Please enjoy this encore of Word Notes. The state of a web application when it's vulnerable to attack due to an insecure configuration. CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-security-misconfiguration Audio reference link: “What Is the Elvish Word for Friend?” Quora, 2021.…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. This week Joe's got some follow up about his chickens. Joe's story is on LLM-powered coding tools, and how they are inc…
…
continue reading
Please enjoy this encore episode of Word Notes. A broad OWASP Top 10 software development category representing missing, ineffective, or unforeseen security measures. CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-insecure-design Audio reference link: “Oceans Eleven Problem Constraints Assumptions.” by Steve Jones, YouTube, 4 Nove…
…
continue reading
This week, our hosts Dave Bittner and Joe Carrigan, are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines, while our other host, Maria Varmazis is at a conference. We begin with some follow-up, as Joe reflects on the density of gold. Then, Dave shares some heartfelt and moving words ab…
…
continue reading

1
Autonomous ships, cyber security and the workboat code
19:06
19:06
Play later
Play later
Lists
Like
Liked
19:06In this conversation, Felix and Oli discuss the development of a hydrogen-powered uncrewed surface vessel (USV) and the associated cybersecurity challenges. They explore the importance of integrating cybersecurity measures from the outset, navigating regulatory frameworks like Workboat Code 3, and the ongoing challenges of ensuring compliance and s…
…
continue reading
Today’s episode looks a little different as Michael and Sam are talking to the entire YOUTH.SEC.CON. team! Arthi Vasudevan, Reynaldo Gonzalez, and Mary DiFiore-Smith joined the podcast to discuss all aspects of our first event focused on 9th – 12th grade students. Listen now to learn about the talks and activities, eligibility, registration, safety…
…
continue reading
Please enjoy this encore of Word Notes. A broad class of attack vectors, where an attacker supplies input to an applications command interpreter that results in unanticipated functionality. CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-injection Audio reference link: “APPSEC Cali 2018 - Taking on the King: Killing Injection Vulne…
…
continue reading

1
You get a million dollars, and you get a million dollars!
37:12
37:12
Play later
Play later
Lists
Like
Liked
37:12This week, while Dave Bittner is out, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start off with a lot of follow up on listener feedback this week! Justin shares a thought about how to tra…
…
continue reading

1
OWASP cryptographic failures (noun) [Word Notes]
6:35
6:35
Play later
Play later
Lists
Like
Liked
6:35Please enjoy this encore of Word Notes. Code that fails to protect sensitive information. CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-cryptographic-failure Audio reference link: Vandana Verma. “OWASP Spotlight - Project 10 - Top10.” YouTube Video. YouTube, January 4, 2021.By N2K Networks
…
continue reading
This week our hosts, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. First, we start off with some more follow-up on EZ passes, along with the newest iteration, as Kailey Cornick sh…
…
continue reading

1
Definitions of Pen Testing with Darin Fredde
35:33
35:33
Play later
Play later
Lists
Like
Liked
35:33Sam and Michael are joined by Offensive Security Advisor, Darin Fredde! They discuss the need to move beyond compliance checkboxes, the importance of continuous pen testing, and the disconnect between marketing claims and real-world security implementations. Things Mentioned: Having trouble with your OT.SEC.CON. or EXEC.SEC.CON. ticket? Reach out t…
…
continue reading

1
Hello? Is it malware you’re looking for? [OMITB]
37:37
37:37
Play later
Play later
Lists
Like
Liked
37:37Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K …
…
continue reading

1
account takeover prevention (noun) [Word Notes]
6:23
6:23
Play later
Play later
Lists
Like
Liked
6:23Enjoy this encore of Word Notes. The prevention of the first part of an intrusion kill chain model exploitation technique, where the hacker steals valid logging credentials from a targeted victim. CyberWire Glossary link: https://thecyberwire.com/glossary/account-takeover-preventionBy N2K Networks
…
continue reading
This week our hosts, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow-up on E-ZPass scams—a listener suggests that scammers may be exploiting exposed licens…
…
continue reading
Please enjoy this encore of Word Notes. The process of proactively searching through networks to detect and isolate security threats, rather than relying on security solutions or services to detect those threats. CyberWire Glossary link: https://thecyberwire.com/glossary/threat-hunting Audio reference link: “My ‘Aha!" Moment - Methods, Tips, & Less…
…
continue reading
On Hacking Humans, this week Dave Bittner is back with Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), and they are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Joe shares a bit of follow up on scam victims sharing their experiences of losing m…
…
continue reading

1
AppSec Fish in a Barrel with Steven Schmidt
36:28
36:28
Play later
Play later
Lists
Like
Liked
36:28Michael and Sam are joined by Field CTO, Steven Schmidt! They discuss the early days of application security, the evolution of AppSec tools and processes, and challenges in balancing developer speed with security requirements. Thank you to Snyk for sponsoring this episode! Learn more about building secure applications at https://snyk.io and chat wi…
…
continue reading

1
vulnerability management (noun) [Word Notes]
8:16
8:16
Play later
Play later
Lists
Like
Liked
8:16Please enjoy this encore of Word Notes. The continuous practice of identifying classifying, prioritizing, remediating, and mitigating software vulnerabilities within this. CyberWire Glossary link: https://thecyberwire.com/glossary/vulnerability-management Audio reference link: “Vulnerability Scanning - Comptia Security+ sy0-501 - 1.5.” YouTube, You…
…
continue reading
On Hacking Humans, this week Dave Bittner is on vacation so our two hosts Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Our hosts start out with some follow up on chicken talk from last week. M…
…
continue reading

1
software bill of materials (SBOM) (noun) [Word Notes]
6:59
6:59
Play later
Play later
Lists
Like
Liked
6:59Please enjoy this encore of Word Notes. A formal record containing the details and supply chain relationships of various components used in building software.By N2K Networks
…
continue reading
On Hacking Humans, this week Dave Bittner is on vacation so our two hosts Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start off the show with some follow-up from a long-time listener who s…
…
continue reading

1
Network Monitoring in OT/ICS Environments with Stuart Bailey
31:05
31:05
Play later
Play later
Lists
Like
Liked
31:05In today’s episode Michael and Sam are catching up with Security Consulting Manager, ICS/OT at Accenture, Stuart Bailey! Stuart shares his journey from a career in social work to cybersecurity, the challenges of working on OT environments, and the importance of network monitoring for critical infrastructure. Things Mentioned: · Romanian energy supp…
…
continue reading

1
The new malware on the block. [Only Malware in the Building]
35:03
35:03
Play later
Play later
Lists
Like
Liked
35:03Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K …
…
continue reading