The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading

1
Blizzard warning: Amazon freezes midnight hack.
32:11
32:11
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
32:11Researchers disrupt a cyber campaign by Russia’s Midnight Blizzard. The Salesloft Drift breach continues to ripple outward. WhatsApp patches a critical flaw in its iOS and Mac apps. A fake PDF editing tool delivers the TamperChef infostealer. A hacker finds crash data Tesla claimed not to have. Spain cancels a €10 million contract with Huawei. A fr…
…
continue reading

1
Hot sauce and hot takes: An Only Malware in the Building special. [OMITB]
36:37
36:37
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
36:37Welcome in! You’ve entered, Only Malware in the Building — but this time, it’s not just another episode. This is a special edition you won’t want to miss. For the first time, our hosts are together in-studio — and they’re turning up the heat. Literally. Join Selena Larson, Proofpoint intelligence analyst and host of their po…
…
continue reading

1
Live from Black Hat: Ransomware, Responsible Disclosure, and the Rise of AI [Microsoft Threat Intelligence Podcast]
43:56
43:56
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
43:56While our team is observing the Labor Day holiday in the US, we hope you will enjoy this episode of The Microsoft Threat Intelligence Podcast . New episodes airs on the N2K CyberWIre network every other Wednesday. In this episode of the Microsoft Threat Intelligence Podcast, host Sherrod DeGrippo is live from Black Hat 2025 with a special lineup…
…
continue reading

1
The labor behind the labor. [Special Edition]
35:26
35:26
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
35:26This Labor Day, we’re celebrating more than just a holiday. Join us in celebrating not just the work, but the people who make it possible — the labor behind the labor.We’re honoring the people who bring their creativity, dedication, and passion to every corner of N2K. The work you hear, read, and see from us doesn’t happen by accident. It’s the res…
…
continue reading

1
Marina Ciavatta: Going after the human error. [Social engineer] [Career Notes]
11:06
11:06
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
11:06Please enjoy this encore of Career Notes. Social engineer and CEO of Hekate, Marina Ciavatta, shares her story of how people think her job is a la Mission Impossible coming from the ceiling with a rope and stealing stuff in the dead of the night. Marina does physical pentesting. Starting with an unused degree in journalism, Marina turned her talent…
…
continue reading

1
Cracks in the wall. [Research Saturday]
13:13
13:13
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
13:13This week, we are joined by Jamie Levy, Director of Adversary Tactics at Huntress, who is discussing their work on "Active Exploitation of SonicWall VPNs." Huntress has released an urgent threat advisory on active exploitation of SonicWall VPNs, with attackers bypassing MFA, pivoting to domain controllers, and ultimately deploying Akira ransomware.…
…
continue reading
A suspected ransomware attack disrupts hundreds of Swedish municipalities. Google warns Gmail users of emerging cyberattacks tied to the ShinyHunters group. A malicious supply chain attack hits the npm registry. Senators press AFLAC for answers following a data breach. Law enforcement takedowns splinter the ransomware ecosystem. The FBI and Dutch p…
…
continue reading

1
Listening in on the listeners.
29:15
29:15
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
29:15The FBI shares revelations on Salt Typhoon’s reach. Former NSA and FBI directors sound alarm on infrastructure cybersecurity gaps. Google is launching a new cyber “disruption unit”. A new report highlights cyber risks to the maritime industry. A Pennsylvania healthcare provider suffers a data breach affecting over six hundred thousand individuals. …
…
continue reading

1
Whistle-blown and wide open.
25:57
25:57
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
25:57A whistle-blower claims DOGE uploaded a sensitive Social Security database to a vulnerable cloud server. Allies push back against North Korean IT scams. ZipLine is a sophisticated phishing campaign targeting U.S.-based manufacturing. Researchers uncover a residential proxy network operating across at least 20 U.S. states. Flock Safety license plate…
…
continue reading

1
Rolling the dice on cybersecurity.
26:30
26:30
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
26:30A cyberattack disrupts state systems in Nevada. A China-linked threat actor targets Southeast Asian diplomats. A new attack method hides malicious prompts inside images processed by AI systems.Experts ponder preventing AI agents from going rogue. A new study finds AI is hitting entry-level jobs hardest. Michigan’s Supreme Court upholds limits on ce…
…
continue reading

1
A farmers market of stolen data.
22:12
22:12
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
22:12Farmers Insurance discloses a data breach affecting over a million people. Agentic AI tools fall for common scams. A new bill in Congress looks to revive letters of marque for the digital age. Cybercriminals target macOS users with the Shamos infostealer. New Android spyware masquerades as antivirus to target Russian business executives. CISA seeks…
…
continue reading

1
Julian Waits: Find a way to help society. [Serial Entrepreneur] [Career Notes]
11:04
11:04
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
11:04Please enjoy this encore of Career Notes. Senior Vice President and Executive in Residence with Rapid7 and Chairman for Cyversity, Julian Waits, grew up in the era of the Justice League and Superman and it shaped his career. Julian always wanted to do something where he could find a way to help society to basically help others. Starting out as a Ba…
…
continue reading

1
Beyond the smoke screen. [Research Saturday]
22:22
22:22
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
22:22This week, we are joined by Dr. Renée Burton, VP of Infoblox Threat Intel, who is discussing their work on VexTrio, a notorious traffic distribution system (TDS) involved in digital fraud. The VexTrio investigation uncovers a massive global ad fraud and scam operation powered by just 250 virtual machines, tying it directly to named individuals and …
…
continue reading