Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
N2k Networks Podcasts
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading
The FAIK Files explores the mysterious and often wacky intersection of AI, technology, and humanity. From cognitive warfare to digital deception, we examine how AI is reshaping our reality through news, research, and real-world examples. Join us for a thought-provoking journey into a world where anything can be faked, truth is increasingly elusive, and human nature meets artificial intelligence head-on.
…
continue reading
"Only Malware in the Building” is a monthly podcast crafted through a collaboration between N2K CyberWire and the Proofpoint DISCARDED podcast. Join hosts Selena Larson, Threat Researcher at Proofpoint, Dave Bittner—host of the CyberWire Daily podcast—and Keith Mularski, former FBI Cyber Division Unit Chief and now Chief Global Officer at Qintel, as this trio of cyber-savvy partners-in-crime team up to uncover the secrets behind some of the most notorious cyberattacks. This segment focuses o ...
…
continue reading
T-Minus Space Daily from N2K CyberWire delivers critical daily intelligence on what powers, protects, and connects the space industry and innovation. N2K CyberWire’s space team makes visible the global connections that facilitate connectivity and commerce through space networks. We cover the news of the day and regularly feature experts covering space’s role in critical infrastructure and national security, space operations and intelligence, data and cybersecurity in space, domestic and inte ...
…
continue reading
Threat Vector is the hit podcast from Palo Alto Networks, with over 1 million downloads and growing. Get inside the minds of top cybersecurity leaders as they break down real threats, smart defenses, and what's coming next. Each episode features insights from industry experts, customers, and Palo Alto Networks teams. It is built for security pros who want to stay ahead.
…
continue reading
Step inside the diverse and fascinating worlds of cybersecurity professionals around the globe and hear their personal stories in their own words.
…
continue reading
WSUS attacks escalate as emergency patch fails to fully contain exploited flaw. Schneider Electric and Emerson are listed among victims in the Oracle EBS cyberattack. Google debunks reports of a massive GMail breach. A new banking trojan mimics human behavior for stealth. Sweden’s power grid operator confirms a cyberattack. Italian spyware targets …
…
continue reading
1
UKSA adds to its space tracking capabilities.
26:41
26:41
Play later
Play later
Lists
Like
Liked
26:41The UK Space Agency (UKSA) has selected Slingshot Aerospace for a Provision of Optical Delivery Partner contract to expand the UK’s satellite tracking capabilities. The University of Florida, in collaboration with NASA, MIT, Vanguard Automation, AIM Photonics and Germany’s Fraunhofer Heinrich Hertz Institute, have a suite of photonic AI chips en ro…
…
continue reading
1
Identity access management (IAM) (noun) [Word Notes]
11:55
11:55
Play later
Play later
Lists
Like
Liked
11:55Please enjoy this encore of Word Notes. A set of solutions for ensuring that the right users can only access the appropriate resources. CyberWire Glossary link: https://thecyberwire.com/glossary/identity-and-access-management Audio reference link: “The Wrath of Khan (1982) ‘Kirk’s Response,’” by Russell, YouTube, 16 May 2017.…
…
continue reading
1
Regulation takeaways with Ethan Cook. [CISO Perspectives]
41:23
41:23
Play later
Play later
Lists
Like
Liked
41:23On this episode, host Kim Jones is joined by Ethan Cook, N2K’s lead analyst and editor, for a deeper, more reflective conversation on cybersecurity regulation, privacy, and the future of policy. This episode steps back from the news cycle to connect the dots and explore where the regulatory landscape is heading — and why it matters. Ethan, who will…
…
continue reading
1
The impact of data privacy on cyber. [CISO Perspectives]
42:04
42:04
Play later
Play later
Lists
Like
Liked
42:04Privacy is one of the most universally valued rights. Yet, despite its importance, data breaches exposing millions of people's sensitive information have become routine. Many have come to assume that their personal data has already been, or inevitably will be, compromised. Despite this reality, prioritizing privacy is more important than ever. In t…
…
continue reading
1
The UN’s big push for global cybercrime rules.
24:41
24:41
Play later
Play later
Lists
Like
Liked
24:41The UN launches the world’s first global treaty to combat cybercrime. A House Democrats’ job portal left security clearance data exposed online. A new data leak exposes 183 million email addresses and passwords. Threat actors target Discord users with an open-source red-team toolkit. A new campaign targets unpatched WordPress plugins. The City of G…
…
continue reading
1
Japan joins the ISS resupply services missions.
23:35
23:35
Play later
Play later
Lists
Like
Liked
23:35JAXA successfully launched a cargo spacecraft for its first mission to deliver supplies to the International Space Station (ISS). The European Council calls for an accelerated joint development of space assets and services that serve security and defence purposes. Firefly Aerospace is set to expand and add 300 jobs to its Cedar Park, Texas location…
…
continue reading
1
Derek Manky: Putting the rubber to the road. [Threat Intelligence] [Career Notes]
9:38
9:38
Play later
Play later
Lists
Like
Liked
9:38Please enjoy this encore of Career Notes. Chief Security Strategist and VP of Global Threat Intelligence at FortiGuard Labs, Derek Manky, shares his story from programmer to cybersecurity and how it all came together. Derek started his career teaching programming because he had such a passion for it. When he joined Fortinet, Derek said putting wher…
…
continue reading
1
Derek Manky: Putting the rubber to the road. [Threat Intelligence]
9:38
9:38
Play later
Play later
Lists
Like
Liked
9:38Please enjoy this encore of Word Notes. Chief Security Strategist and VP of Global Threat Intelligence at FortiGuard Labs, Derek Manky, shares his story from programmer to cybersecurity and how it all came together. Derek started his career teaching programming because he had such a passion for it. When he joined Fortinet, Derek said putting where …
…
continue reading
1
A look behind the lens. [Research Saturday]
24:30
24:30
Play later
Play later
Lists
Like
Liked
24:30Noam Moshe, Claroty’s Vulnerability Research Team Lead, joins Dave to discuss Team 82's work on "Turning Camera Surveillance on its Axis." Team82 disclosed four vulnerabilities in Axis.Remoting—deserialization, a MiTM “pass-the-challenge” NTLMSSP flaw, and an unauthenticated fallback HTTP endpoint—that enable pre-auth remote code execution against …
…
continue reading
The region of space at 550,000 kilometers above Earth poses unique physical engineering challenges for space flight and operations. We explore cislunar space on the Nexus. Parker Wishik, Senior Communications Specialist at The Aerospace Corporation, is joined by Kelli Kedis Ogborn, Vice President of Global Space Programs at the Space Foundation, W…
…
continue reading
A former defense contractor is charged with attempting to sell trade secrets to Russia. Researchers uncover critical vulnerabilities in TP-Link routers. Microsoft patches a critical Windows Server Update Service flaw. CISA issues eight new ICS advisories. “Shadow Escape” targets LLMs database connections. Halloween-themed scams spike. Our guest is …
…
continue reading
1
Maneuvering for Advantage: Space Force Bets $905M on GEO Mobility.
23:46
23:46
Play later
Play later
Lists
Like
Liked
23:46The United States Space Force (USSF) expects to award $905 million in contracts over the next five years through a new Maneuverable GEO program. Hughes Network Systems, an EchoStar company, has acquired Anderson Connectivity. Hungary signs the Artemis Accords and shares plans to send another astronaut to the ISS, and more. Remember to leave us a 5-…
…
continue reading
Welcome back to The FAIK Files! In this week's episode: Google begins rolling out Gemini 3.0 and other AI updates. We look at new studies showing where AI gets it wrong, from misrepresenting news to writing vulnerable code. The latest on AI-driven job loss, including leaked documents from Amazon. A roundup of recent deepfake stories, including a To…
…
continue reading
CISA Layoffs threaten U.S. cyber coordination with states, businesses, and foreign partners. Google issues its second emergency Chrome update in a week, and puts Privacy Sandbox out of its misery. OpenAI’s new browser proves vulnerable to indirect prompt injection. SpaceX disables Starlink devices used by scam compounds. Reddit sues alleged data sc…
…
continue reading
Airbus, Leonardo, and Thales have signed a Memorandum of Understanding (MOU) aimed at combining their respective space activities into a new company. The Republic of Cyprus has signed an Associate Agreement with the European Space Agency (ESA), and is expected to become an Associate Member in the coming months. SatVu has announced its participation…
…
continue reading
In this episode of Threat Vector, David Moulton speaks with two cybersecurity leaders from Palo Alto Networks: Sarit Tager, Vice President of Product Management, and Krithivasan Mecheri (Krithi), Senior Director of Product Security. Together, they dive into the urgent challenges of securing modern development in the age of AI. The discussion e…
…
continue reading
This week on Caveat, Dave and Ben welcome back N2K’s own Ethan Cook for our latest policy deep dive segment. As our lead analyst, Ethan shares his knowledge of law, privacy, and surveillance on the latest policy developments shaping the cybersecurity and legal landscape. While this show covers legal topics, and Ben is a lawyer, the views …
…
continue reading
This week, while Dave Bittner is on vacation, hosts Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing …
…
continue reading
A foreign threat actor breached a key U.S. nuclear weapons manufacturing site. The cyberattack on Jaguar Land Rover is the most financially damaging cyber incident in UK history. A new report from Microsoft’ warns that AI is reshaping cybersecurity at an unprecedented pace. The ToolShell vulnerability fuels Chinese cyber operations across four cont…
…
continue reading
Vantor, formerly Maxar Intelligence, has been awarded a contract to support the US Space Force (USSF) in tracking high-interest objects that pass through "blind spots" in space. Researchers at Rensselaer Polytechnic Institute (RPI) and Texas A&M University have secured a $1 million grant from the Air Force Office of Scientific Research for cislunar…
…
continue reading
CISA warns a Windows SMB privilege escalation flaw is under Active exploitation. Microsoft issues an out of band fix for a WinRE USB input failure. Nation state hackers had long term access to F5. Envoy Air confirms it was hit by the zero-day in Oracle’s E-Business Suite. A nonprofit hospital system in Massachusetts suffers a cyberattack. Russian’s…
…
continue reading