The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Cyberwire Inc Podcasts
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
A fun and informative cybersecurity audio glossary from N2K.
…
continue reading
…
continue reading
Every Saturday, we sit down with cybersecurity researchers to talk shop about the latest threats, vulnerabilities, and technical discoveries.
…
continue reading
Step inside the diverse and fascinating worlds of cybersecurity professionals around the globe and hear their personal stories in their own words.
…
continue reading
"Only Malware in the Building” is a monthly podcast crafted through a collaboration between N2K CyberWire and the Proofpoint DISCARDED podcast. Join hosts Selena Larson, Threat Researcher at Proofpoint, Dave Bittner—host of the CyberWire Daily podcast—and Keith Mularski, former FBI Cyber Division Unit Chief and now Chief Global Officer at Qintel, as this trio of cyber-savvy partners-in-crime team up to uncover the secrets behind some of the most notorious cyberattacks. This segment focuses o ...
…
continue reading
T-Minus Space Daily from N2K CyberWire delivers critical daily intelligence on what powers, protects, and connects the space industry and innovation. N2K CyberWire’s space team makes visible the global connections that facilitate connectivity and commerce through space networks. We cover the news of the day and regularly feature experts covering space’s role in critical infrastructure and national security, space operations and intelligence, data and cybersecurity in space, domestic and inte ...
…
continue reading
Get ready for a deep dive into what cybersecurity professionals often refer to as the "8th Layer" of security: HUMANS. Welcome to 8th Layer Insights (8Li). This podcast is a multidisciplinary exploration into how the complexities of human nature affect security and risk. Author, security researcher, and behavior science enthusiast Perry Carpenter taps experts for their insights and illumination. Topics include cybersecurity, psychology, behavior science, communication, leadership, and more.
…
continue reading
Control Loop is the OT Cybersecurity Podcast, your terminal for ICS security, intelligence, and learning. Every two weeks, we bring you the latest news, strategies, and technologies that industry professionals rely on to safeguard civilization.
…
continue reading
Flash cybersecurity advisories from the US Government. These alerts provide timely technical and operational information, indicators of compromise, and mitigations for current major security threats, vulnerabilities, and exploits. These alerts have been edited and adapted for audio by N2K Networks as a public service.
…
continue reading
An occasional series from the team at the Hacking Humans podcast. N2K's Dave Bittner and co-host from the Johns Hopkins University Information Security Institute, Joe Carrigan, are joined by the N2K's Chief Security Officer and Chief analyst, Rick Howard. The team watches clips from some of their favorite movies, clips which demonstrate examples of the social engineering scams and schemes they talk about on Hacking Humans.
…
continue reading
Readings from the dark underworld of cybercrime and espionage, recalled to life, reinterpreted, and reimagined for the benefit of the infosec literati. Oh, and it’s also just play and parody from the ever-restless imaginations of the N2K editorial team.
…
continue reading
1
Attack of the automated ops. [Research Saturday]
19:40
19:40
Play later
Play later
Lists
Like
Liked
19:40Today we are joined by Dario Pasquini, Principal Researcher at RSAC, sharing the team's work on WhenAIOpsBecome “AI Oops”: Subverting LLM-driven IT Operations via Telemetry Manipulation. A first-of-its-kind security analysis showing that LLM-driven AIOps agents can be tricked by manipulated telemetry, turning automation itself into a new attack vec…
…
continue reading
1
The atmospheric impacts of satellite re-entry.
26:07
26:07
Play later
Play later
Lists
Like
Liked
26:07When satellites burn up upon re-entering Earth’s atmosphere, they release particles and gases, including metals like aluminium, which may affect atmospheric chemistry. This process, known as atmospheric ablation, is still poorly understood, but early evidence suggests metal content in the atmosphere is rising. To address these uncertainties, the UK…
…
continue reading
Today we are joined by Dario Pasquini, Principal Researcher at RSAC, sharing the team's work on WhenAIOpsBecome “AI Oops”: Subverting LLM-driven IT Operations via Telemetry Manipulation. A first-of-its-kind security analysis showing that LLM-driven AIOps agents can be tricked by manipulated telemetry, turning automation itself into a new attack vec…
…
continue reading
CISA says cooperation between federal agencies and the private sector remains steady. Long-standing Linux kernel vulnerability in active ransomware campaigns confirmed. A Chinese-linked group targets diplomatic organizations in Hungary, Belgium, and other European nations. A government contractor breach exposes data of over 10 million Americans. Lu…
…
continue reading
The European Space Agency (ESA) is establishing its first hub in Asia with a new office in Tokyo, Japan. Luxembourg telecommunications company OrbitsIQ Global has acquired UNIO Enterprise. Space infrastructure company Catalyx Space has raised $5.4 million in an oversubscribed Seed funding round, and more. Remember to leave us a 5-star rating and re…
…
continue reading
Happy Halloween from the team at N2K Networks! We hope you share in our Halloween tradition of listening to the Malware Mash. You can check out our video here. Lyrics I was coding in the lab late one night when my eyes beheld an eerie sight for my malware threat score began to rise and suddenly to my surprise... It did the Mash It did the Malware…
…
continue reading
Happy Halloween from the team at N2K Networks! We hope you share in our Halloween tradition of listening to the Malware Mash. You can check out our video here. Lyrics I was coding in the lab late one night when my eyes beheld an eerie sight for my malware threat score began to rise and suddenly to my surprise... It did the Mash It did the Malware…
…
continue reading
A Texas telecom confirms a nation-state attack. A global outage disrupts Azure and Microsoft 365 services. Malicious npm packages steal sensitive data from Windows, Linux, and macOS systems. Hacktivists have breached multiple critical infrastructure systems across Canada. Major chipmakers spill the TEE. TP-Link home routers fall under federal scrut…
…
continue reading
1
China says it’ll land humans on the Moon by 2030.
32:11
32:11
Play later
Play later
Lists
Like
Liked
32:11China says it's on course to land astronauts on the Moon by 2030. stc group has committed to a prepayment of $175 million for future services from AST SpaceMobile (AST). Japan’s Axelspace Corporation has signed agreements with governmental organizations from Ghana and Kenya to support Earth Observation (EO) data usage, and more. Remember to leave u…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, …
…
continue reading
Explosions rock a shuttered Myanmar cybercrime hub. The Aisuru botnet shifts from DDoS to residential proxies. Dentsu confirms data theft at Merkle. Boston bans biometrics. Proton restores journalists’ email accounts after backlash. Memento labs admits Dante spyware is theirs. Australia accuses Microsoft of improperly forcing users into AI upgrades…
…
continue reading
Japan’s HTV-X cargo spacecraft has arrived at the International Space Station for the first time ever. Japan’s SKY Perfect JSAT Corporation has signed a memorandum of understanding with Korea’s KT SAT to jointly develop and test 5G Non-Terrestrial Network (NTN) technologies. The US Federal Communications Commission (FCC) voted to kick off two proce…
…
continue reading
WSUS attacks escalate as emergency patch fails to fully contain exploited flaw. Schneider Electric and Emerson are listed among victims in the Oracle EBS cyberattack. Google debunks reports of a massive GMail breach. A new banking trojan mimics human behavior for stealth. Sweden’s power grid operator confirms a cyberattack. Italian spyware targets …
…
continue reading
1
UKSA adds to its space tracking capabilities.
26:41
26:41
Play later
Play later
Lists
Like
Liked
26:41The UK Space Agency (UKSA) has selected Slingshot Aerospace for a Provision of Optical Delivery Partner contract to expand the UK’s satellite tracking capabilities. The University of Florida, in collaboration with NASA, MIT, Vanguard Automation, AIM Photonics and Germany’s Fraunhofer Heinrich Hertz Institute, have a suite of photonic AI chips en ro…
…
continue reading
1
Identity access management (IAM) (noun) [Word Notes]
11:55
11:55
Play later
Play later
Lists
Like
Liked
11:55Please enjoy this encore of Word Notes. A set of solutions for ensuring that the right users can only access the appropriate resources. CyberWire Glossary link: https://thecyberwire.com/glossary/identity-and-access-management Audio reference link: “The Wrath of Khan (1982) ‘Kirk’s Response,’” by Russell, YouTube, 16 May 2017.…
…
continue reading
1
The impact of data privacy on cyber. [CISO Perspectives]
42:04
42:04
Play later
Play later
Lists
Like
Liked
42:04Privacy is one of the most universally valued rights. Yet, despite its importance, data breaches exposing millions of people's sensitive information have become routine. Many have come to assume that their personal data has already been, or inevitably will be, compromised. Despite this reality, prioritizing privacy is more important than ever. In t…
…
continue reading
Privacy is one of the most universally valued rights. Yet, despite its importance, data breaches exposing millions of people's sensitive information have become routine. Many have come to assume that their personal data has already been, or inevitably will be, compromised. Despite this reality, prioritizing privacy is more important than ever. In t…
…
continue reading
Please enjoy this encore of Word Notes. A set of solutions for ensuring that the right users can only access the appropriate resources. CyberWire Glossary link: https://thecyberwire.com/glossary/identity-and-access-management Audio reference link: “The Wrath of Khan (1982) ‘Kirk’s Response,’” by Russell, YouTube, 16 May 2017. Learn more about y…
…
continue reading
1
The UN’s big push for global cybercrime rules.
24:41
24:41
Play later
Play later
Lists
Like
Liked
24:41The UN launches the world’s first global treaty to combat cybercrime. A House Democrats’ job portal left security clearance data exposed online. A new data leak exposes 183 million email addresses and passwords. Threat actors target Discord users with an open-source red-team toolkit. A new campaign targets unpatched WordPress plugins. The City of G…
…
continue reading
1
Japan joins the ISS resupply services missions.
23:35
23:35
Play later
Play later
Lists
Like
Liked
23:35JAXA successfully launched a cargo spacecraft for its first mission to deliver supplies to the International Space Station (ISS). The European Council calls for an accelerated joint development of space assets and services that serve security and defence purposes. Firefly Aerospace is set to expand and add 300 jobs to its Cedar Park, Texas location…
…
continue reading
1
Derek Manky: Putting the rubber to the road. [Threat Intelligence] [Career Notes]
9:38
9:38
Play later
Play later
Lists
Like
Liked
9:38Please enjoy this encore of Career Notes. Chief Security Strategist and VP of Global Threat Intelligence at FortiGuard Labs, Derek Manky, shares his story from programmer to cybersecurity and how it all came together. Derek started his career teaching programming because he had such a passion for it. When he joined Fortinet, Derek said putting wher…
…
continue reading
1
Derek Manky: Putting the rubber to the road. [Threat Intelligence]
9:38
9:38
Play later
Play later
Lists
Like
Liked
9:38Please enjoy this encore of Word Notes. Chief Security Strategist and VP of Global Threat Intelligence at FortiGuard Labs, Derek Manky, shares his story from programmer to cybersecurity and how it all came together. Derek started his career teaching programming because he had such a passion for it. When he joined Fortinet, Derek said putting where …
…
continue reading
1
A look behind the lens. [Research Saturday]
24:30
24:30
Play later
Play later
Lists
Like
Liked
24:30Noam Moshe, Claroty’s Vulnerability Research Team Lead, joins Dave to discuss Team 82's work on "Turning Camera Surveillance on its Axis." Team82 disclosed four vulnerabilities in Axis.Remoting—deserialization, a MiTM “pass-the-challenge” NTLMSSP flaw, and an unauthenticated fallback HTTP endpoint—that enable pre-auth remote code execution against …
…
continue reading