Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
N2k Networks Podcasts
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading
The FAIK Files explores the mysterious and often wacky intersection of AI, technology, and humanity. From cognitive warfare to digital deception, we examine how AI is reshaping our reality through news, research, and real-world examples. Join us for a thought-provoking journey into a world where anything can be faked, truth is increasingly elusive, and human nature meets artificial intelligence head-on.
…
continue reading
T-Minus Space Daily from N2K CyberWire delivers critical daily intelligence on what powers, protects, and connects the space industry and innovation. N2K CyberWire’s space team makes visible the global connections that facilitate connectivity and commerce through space networks. We cover the news of the day and regularly feature experts covering space’s role in critical infrastructure and national security, space operations and intelligence, data and cybersecurity in space, domestic and inte ...
…
continue reading
"Only Malware in the Building” is a monthly podcast crafted through a collaboration between N2K CyberWire and the Proofpoint DISCARDED podcast. Join hosts Selena Larson, Threat Researcher at Proofpoint, Dave Bittner—host of the CyberWire Daily podcast—and Keith Mularski, former FBI Cyber Division Unit Chief and now Chief Global Ambassador at Qintel, as this trio of cyber-savvy partners-in-crime team up to uncover the secrets behind some of the most notorious cyberattacks. This segment focuse ...
…
continue reading
Threat Vector is the hit podcast from Palo Alto Networks, with over 1 million downloads and growing. Get inside the minds of top cybersecurity leaders as they break down real threats, smart defenses, and what's coming next. Each episode features insights from industry experts, customers, and Palo Alto Networks teams. It is built for security pros who want to stay ahead.
…
continue reading
A fun and informative cybersecurity audio glossary from N2K.
…
continue reading
1
Eric Escobar: Collaboration is key. [Pen tester] [Career Notes]
8:42
8:42
Play later
Play later
Lists
Like
Liked
8:42Please enjoy this encore of Career Notes. Principal consultant and pen tester at Secureworks, Eric Escobar, shares his career path translating his childhood favorite Legos to civil engineering and pivoting to cybersecurity. Eric was always headed toward engineering and got both his bachelor and master degrees in civil engineering. Upon breaking int…
…
continue reading
1
The lies that let AI run amok. [Research Saturday]
24:36
24:36
Play later
Play later
Lists
Like
Liked
24:36Darren Meyer, Security Research Advocate at Checkmarx, is sharing their work on "Bypassing AI Agent Defenses with Lies-in-the-Loop." Checkmarx Zero researchers introduce “lies-in-the-loop,” a new attack technique that bypasses human‑in‑the‑loop AI safety controls by deceiving users into approving dangerous actions that appear benign. Using examples…
…
continue reading
From radiation-hardened hardware to edge computing in deep space, AI is moving off the ground and into one of the harshest environments imaginable. Ralph Grundler is the Director of Space Business Development and Space R&D at Aitech Systems. He shares his decades of experience from building computers that don’t just survive space—they think there. …
…
continue reading
Trump signs the National Defense Authorization Act for 2026. Danish intelligence officials accuse Russia of orchestrating cyberattacks against critical infrastructure. LongNosedGoblin targets government institutions across Southeast Asia and Japan. A new Android botnet infects nearly two million devices. WatchGuard patches its Firebox firewalls. Am…
…
continue reading
1
From Presidential Decrees to Tumbling Satellites.
23:57
23:57
Play later
Play later
Lists
Like
Liked
23:57US President Donald Trump has signed an Executive Order (EO) titled Ensuring American Space Superiority. Rheinmetall is partnering with ICEYE to fulfil a 1.7-billion-euro or $2 billion order from the German Armed Forces. HawkEye 360 has completed the acquisition of Innovative Signal Analysis supported by equity and debt financings totaling $150 mil…
…
continue reading
1
What's My Password? (feat. Dave Lewis of 1Password)
36:34
36:34
Play later
Play later
Lists
Like
Liked
36:34Welcome back to The FAIK Files! In this week's episode: We sit down with Dave Lewis, Global Advisory CISO for 1Password. We discuss the state of identity security and why you shouldn't rely on your browser's password manager. How to keep credentials safe in the age of AI agents. Insights into how companies are adopting AI and the security considera…
…
continue reading
Hewlett Packard Enterprise patches a maximum-severity vulnerability in its OneView infrastructure management software. Cisco warns a critical zero-day is under active exploitation. An emergency Chrome update fixes two high-severity vulnerabilities. French authorities make multiple arrests. US authorities dismantle an unlicensed crypto exchange accu…
…
continue reading
1
Congratulations to NASA Administrator Jared Isaacman.
27:13
27:13
Play later
Play later
Lists
Like
Liked
27:13Jared Isaacman has been confirmed as the new NASA Administrator. Rocket Lab launched the STP-S30 mission for the US Space Force’s (USSF’s) Space Systems Command. Redwire Corporation has been contracted by The Exploration Company to provide two docking systems for Nyx, and more. Remember to leave us a 5-star rating and review in your favorite podcas…
…
continue reading
In this episode of Threat Vector, David Moulton is joined by Keith Mularski, Chief Global Ambassador at Qintel and former FBI cybercrime investigator, to explore how threat intel forged in the underground is reshaping today’s SOC. Keith shares lessons from his legendary career—undercover operations, dismantling DarkMarket, and leading some of the F…
…
continue reading
On today’s episode, we welcome back cybersecurity expert Caleb Barlow. Caleb joins us to explore lessons learned from conflicts in Ukraine and Gaza, with a focus on emerging threats to GPS systems and how they could impact security, military operations, and critical infrastructure. While this show covers legal topics, and Ben is a lawyer, the views…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, p…
…
continue reading
Researchers detail a years-long Russian state-sponsored cyber espionage campaign. Israel’s cyber chief warns against complacency. Vulnerabilities affect products from Fortinet and Hitachi Energy. Studies show AI models are rapidly improving at offensive cyber tasks. MITRE expands its D3FEND cybersecurity ontology to cover operational technology. Te…
…
continue reading
1
Europe’s Ariane 6 launch and Asia’s space momentum.
13:50
13:50
Play later
Play later
Lists
Like
Liked
13:50An Ariane 6 rocket launched two Galileo satellites from Europe’s Spaceport in French Guiana. A European Space Agency (ESA) contract awarded to ArianeGroup in 2021 for the development of an Ariane 6 kick stage will reportedly be adapted to cover its evolution into an orbital transfer vehicle (OTV). India’s Digantara Industries has raised $50 million…
…
continue reading
Venezuela’s state oil company blames a cyberattack on the U.S. An Iranian hacker group offers cash bounties for doxing Israelis. Germany’s lower house of parliament suffers a major email outage. South Korea’s e-commerce breach exposes personal information of nearly all of that nation’s adults. Researchers report active exploitation of two critical …
…
continue reading
1
Microdebris, maneuvers, and managing the orbital commons.
27:17
27:17
Play later
Play later
Lists
Like
Liked
27:17The US and France held a joint orbital exercise as part of the Multinational Force Operation Olympic Defender. EraDrive has raised $5.3M in a seed round to scale the production of their space traffic management system. The US Department of State is seeking qualified individuals to participate as private sector advisors for a discussion group on spa…
…
continue reading
Please enjoy this encore of Word Notes. A zero trust security technique that isolates application workloads from each other, allowing each one to be protected individually. CyberWire Glossary link: https://thecyberwire.com/glossary/microsegmentation Audio reference link: “Micro-Segmentation Masterpieces,” PJ Kirner, Illumio CTO and Co-Founder, …
…
continue reading
In this episode, host Kim Jones tacks a topic that is rapidly moving from theoretical to operational reality: quantum computing. While classical computing will remain the backbone of our systems for years to come, quantum technologies are advancing fast enough that CISOs must begin preparing today. Kim explores what quantum computing really means, …
…
continue reading
Please enjoy this encore of Word Notes. A zero trust security technique that isolates application workloads from each other, allowing each one to be protected individually. CyberWire Glossary link: https://thecyberwire.com/glossary/microsegmentation Audio reference link: “Micro-Segmentation Masterpieces,” PJ Kirner, Illumio CTO and Co-Founder, …
…
continue reading
Apple and Google issue emergency updates to patch zero-days. Google links five additional Chinese state-backed hacking groups to “React2Shell.” France’s Ministry of the Interior was hit by a cyberattack. Atlassian patches roughly 30 third-party vulnerabilities. Microsoft says its December 2025 Patch Tuesday updates are breaking Message Queuing. Res…
…
continue reading
1
Starfish Space completes an autonomous RPO in LEO.
25:36
25:36
Play later
Play later
Lists
Like
Liked
25:36Starfish Space has successfully completed an autonomous rendezvous and proximity operations (RPO) mission in low Earth orbit with Impulse Space. Rocket Lab has marked a milestone with the successful deployment of its first dedicated launch for JAXA. Mission Space has announced its intention to launch its second on-orbit payload with Rogue Space Sys…
…
continue reading
1
Amanda Fennell: There's a cyber warrior in all of us [Information] [Career Notes]
9:33
9:33
Play later
Play later
Lists
Like
Liked
9:33Please enjoy this encore of Career Notes. Chief security officer and chief information officer at Relativity, Amanda Fennell shares her story from archeology to cybersecurity. She shares the path that lead her towards becoming an archeologist and how it turned out not being exactly what she expected. She then shares how she got into the cyber busin…
…
continue reading
1
Root access to the great firewall. [Research Saturday]
26:06
26:06
Play later
Play later
Lists
Like
Liked
26:06Daniel Schwalbe, DomainTools Head of Investigations and CISO, is sharing their work on "Inside the Great Firewall." This two-part research project analyzes an extraordinary 500–600GB leak that exposes the internal architecture, tooling, and human ecosystem behind China’s Great Firewall. Across both parts, you break down thousands of leaked document…
…
continue reading