Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Cyberwire Inc Podcasts

show episodes
 
Artwork
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
Artwork

1
Only Malware in the Building

DISCARDED | N2K Networks

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
"Only Malware in the Building” is a monthly podcast crafted through a collaboration between N2K CyberWire and the Proofpoint DISCARDED podcast. Join hosts Selena Larson, Threat Researcher at Proofpoint, Dave Bittner—host of the CyberWire Daily podcast—and Keith Mularski, former FBI Cyber Division Unit Chief and now Chief Global Officer at Qintel, as this trio of cyber-savvy partners-in-crime team up to uncover the secrets behind some of the most notorious cyberattacks. This segment focuses o ...
  continue reading
 
T-Minus Space Daily from N2K CyberWire delivers critical daily intelligence on what powers, protects, and connects the space industry and innovation. N2K CyberWire’s space team makes visible the global connections that facilitate connectivity and commerce through space networks. We cover the news of the day and regularly feature experts covering space’s role in critical infrastructure and national security, space operations and intelligence, data and cybersecurity in space, domestic and inte ...
  continue reading
 
Artwork

1
8th Layer Insights

Perry Carpenter | N2K Networks

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Get ready for a deep dive into what cybersecurity professionals often refer to as the "8th Layer" of security: HUMANS. Welcome to 8th Layer Insights (8Li). This podcast is a multidisciplinary exploration into how the complexities of human nature affect security and risk. Author, security researcher, and behavior science enthusiast Perry Carpenter taps experts for their insights and illumination. Topics include cybersecurity, psychology, behavior science, communication, leadership, and more.
  continue reading
 
Flash cybersecurity advisories from the US Government. These alerts provide timely technical and operational information, indicators of compromise, and mitigations for current major security threats, vulnerabilities, and exploits. These alerts have been edited and adapted for audio by N2K Networks as a public service.
  continue reading
 
An occasional series from the team at the Hacking Humans podcast. N2K's Dave Bittner and co-host from the Johns Hopkins University Information Security Institute, Joe Carrigan, are joined by the N2K's Chief Security Officer and Chief analyst, Rick Howard. The team watches clips from some of their favorite movies, clips which demonstrate examples of the social engineering scams and schemes they talk about on Hacking Humans.
  continue reading
 
Artwork

1
Shadowspeak

N2K Networks

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Readings from the dark underworld of cybercrime and espionage, recalled to life, reinterpreted, and reimagined for the benefit of the infosec literati. Oh, and it’s also just play and parody from the ever-restless imaginations of the N2K editorial team.
  continue reading
 
Loading …
show series
 
Today we are joined by Dario Pasquini, Principal Researcher at RSAC, sharing the team's work on WhenAIOpsBecome “AI Oops”: Subverting LLM-driven IT Operations via Telemetry Manipulation. A first-of-its-kind security analysis showing that LLM-driven AIOps agents can be tricked by manipulated telemetry, turning automation itself into a new attack vec…
  continue reading
 
When satellites burn up upon re-entering Earth’s atmosphere, they release particles and gases, including metals like aluminium, which may affect atmospheric chemistry. This process, known as atmospheric ablation, is still poorly understood, but early evidence suggests metal content in the atmosphere is rising. To address these uncertainties, the UK…
  continue reading
 
Today we are joined by Dario Pasquini, Principal Researcher at RSAC, sharing the team's work on WhenAIOpsBecome “AI Oops”: Subverting LLM-driven IT Operations via Telemetry Manipulation. A first-of-its-kind security analysis showing that LLM-driven AIOps agents can be tricked by manipulated telemetry, turning automation itself into a new attack vec…
  continue reading
 
CISA says cooperation between federal agencies and the private sector remains steady. Long-standing Linux kernel vulnerability in active ransomware campaigns confirmed. A Chinese-linked group targets diplomatic organizations in Hungary, Belgium, and other European nations. A government contractor breach exposes data of over 10 million Americans. Lu…
  continue reading
 
The European Space Agency (ESA) is establishing its first hub in Asia with a new office in Tokyo, Japan. Luxembourg telecommunications company OrbitsIQ Global has acquired UNIO Enterprise. Space infrastructure company Catalyx Space has raised $5.4 million in an oversubscribed Seed funding round, and more. Remember to leave us a 5-star rating and re…
  continue reading
 
Happy Halloween from the team at N2K Networks! We hope you share in our Halloween tradition of listening to the Malware Mash. You can check out our video ⁠here⁠. Lyrics I was coding in the lab late one night when my eyes beheld an eerie sight for my malware threat score began to rise and suddenly to my surprise... It did the Mash It did the Malware…
  continue reading
 
Happy Halloween from the team at N2K Networks! We hope you share in our Halloween tradition of listening to the Malware Mash. You can check out our video ⁠here⁠. Lyrics I was coding in the lab late one night when my eyes beheld an eerie sight for my malware threat score began to rise and suddenly to my surprise... It did the Mash It did the Malware…
  continue reading
 
A Texas telecom confirms a nation-state attack. A global outage disrupts Azure and Microsoft 365 services. Malicious npm packages steal sensitive data from Windows, Linux, and macOS systems. Hacktivists have breached multiple critical infrastructure systems across Canada. Major chipmakers spill the TEE. TP-Link home routers fall under federal scrut…
  continue reading
 
China says it's on course to land astronauts on the Moon by 2030. stc group has committed to a prepayment of $175 million for future services from AST SpaceMobile (AST). Japan’s Axelspace Corporation has signed agreements with governmental organizations from Ghana and Kenya to support Earth Observation (EO) data usage, and more. Remember to leave u…
  continue reading
 
This week, our hosts ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are sharing the latest in social engineering scams, phishing schemes, …
  continue reading
 
Explosions rock a shuttered Myanmar cybercrime hub. The Aisuru botnet shifts from DDoS to residential proxies. Dentsu confirms data theft at Merkle. Boston bans biometrics. Proton restores journalists’ email accounts after backlash. Memento labs admits Dante spyware is theirs. Australia accuses Microsoft of improperly forcing users into AI upgrades…
  continue reading
 
Japan’s HTV-X cargo spacecraft has arrived at the International Space Station for the first time ever. Japan’s SKY Perfect JSAT Corporation has signed a memorandum of understanding with Korea’s KT SAT to jointly develop and test 5G Non-Terrestrial Network (NTN) technologies. The US Federal Communications Commission (FCC) voted to kick off two proce…
  continue reading
 
WSUS attacks escalate as emergency patch fails to fully contain exploited flaw. Schneider Electric and Emerson are listed among victims in the Oracle EBS cyberattack. Google debunks reports of a massive GMail breach. A new banking trojan mimics human behavior for stealth. Sweden’s power grid operator confirms a cyberattack. Italian spyware targets …
  continue reading
 
The UK Space Agency (UKSA) has selected Slingshot Aerospace for a Provision of Optical Delivery Partner contract to expand the UK’s satellite tracking capabilities. The University of Florida, in collaboration with NASA, MIT, Vanguard Automation, AIM Photonics and Germany’s Fraunhofer Heinrich Hertz Institute, have a suite of photonic AI chips en ro…
  continue reading
 
Please enjoy this encore of Word Notes. A set of solutions for ensuring that the right users can only access the appropriate resources. CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/identity-and-access-management⁠ Audio reference link: “⁠The Wrath of Khan (1982) ‘Kirk’s Response⁠,’” by Russell, YouTube, 16 May 2017.…
  continue reading
 
Privacy is one of the most universally valued rights. Yet, despite its importance, data breaches exposing millions of people's sensitive information have become routine. Many have come to assume that their personal data has already been, or inevitably will be, compromised. Despite this reality, prioritizing privacy is more important than ever. In t…
  continue reading
 
Privacy is one of the most universally valued rights. Yet, despite its importance, data breaches exposing millions of people's sensitive information have become routine. Many have come to assume that their personal data has already been, or inevitably will be, compromised. Despite this reality, prioritizing privacy is more important than ever. In t…
  continue reading
 
Please enjoy this encore of Word Notes. A set of solutions for ensuring that the right users can only access the appropriate resources. CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/identity-and-access-management⁠ Audio reference link: “⁠The Wrath of Khan (1982) ‘Kirk’s Response⁠,’” by Russell, YouTube, 16 May 2017. Learn more about y…
  continue reading
 
The UN launches the world’s first global treaty to combat cybercrime. A House Democrats’ job portal left security clearance data exposed online. A new data leak exposes 183 million email addresses and passwords. Threat actors target Discord users with an open-source red-team toolkit. A new campaign targets unpatched WordPress plugins. The City of G…
  continue reading
 
JAXA successfully launched a cargo spacecraft for its first mission to deliver supplies to the International Space Station (ISS). The European Council calls for an accelerated joint development of space assets and services that serve security and defence purposes. Firefly Aerospace is set to expand and add 300 jobs to its Cedar Park, Texas location…
  continue reading
 
Please enjoy this encore of Career Notes. Chief Security Strategist and VP of Global Threat Intelligence at FortiGuard Labs, Derek Manky, shares his story from programmer to cybersecurity and how it all came together. Derek started his career teaching programming because he had such a passion for it. When he joined Fortinet, Derek said putting wher…
  continue reading
 
Please enjoy this encore of Word Notes. Chief Security Strategist and VP of Global Threat Intelligence at FortiGuard Labs, Derek Manky, shares his story from programmer to cybersecurity and how it all came together. Derek started his career teaching programming because he had such a passion for it. When he joined Fortinet, Derek said putting where …
  continue reading
 
Noam Moshe, Claroty’s Vulnerability Research Team Lead, joins Dave to discuss Team 82's work on "Turning Camera Surveillance on its Axis." Team82 disclosed four vulnerabilities in Axis.Remoting—deserialization, a MiTM “pass-the-challenge” NTLMSSP flaw, and an unauthenticated fallback HTTP endpoint—that enable pre-auth remote code execution against …
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play