Deception, influence, and social engineering in the world of cyber crime.
…
  continue reading
N2k Networks Podcasts
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
  continue reading
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
  continue reading
The FAIK Files explores the mysterious and often wacky intersection of AI, technology, and humanity. From cognitive warfare to digital deception, we examine how AI is reshaping our reality through news, research, and real-world examples. Join us for a thought-provoking journey into a world where anything can be faked, truth is increasingly elusive, and human nature meets artificial intelligence head-on.
…
  continue reading
"Only Malware in the Building” is a monthly podcast crafted through a collaboration between N2K CyberWire and the Proofpoint DISCARDED podcast. Join hosts Selena Larson, Threat Researcher at Proofpoint, Dave Bittner—host of the CyberWire Daily podcast—and Keith Mularski, former FBI Cyber Division Unit Chief and now Chief Global Officer at Qintel, as this trio of cyber-savvy partners-in-crime team up to uncover the secrets behind some of the most notorious cyberattacks. This segment focuses o ...
…
  continue reading
T-Minus Space Daily from N2K CyberWire delivers critical daily intelligence on what powers, protects, and connects the space industry and innovation. N2K CyberWire’s space team makes visible the global connections that facilitate connectivity and commerce through space networks. We cover the news of the day and regularly feature experts covering space’s role in critical infrastructure and national security, space operations and intelligence, data and cybersecurity in space, domestic and inte ...
…
  continue reading
Threat Vector is the hit podcast from Palo Alto Networks, with over 1 million downloads and growing. Get inside the minds of top cybersecurity leaders as they break down real threats, smart defenses, and what's coming next. Each episode features insights from industry experts, customers, and Palo Alto Networks teams. It is built for security pros who want to stay ahead.
…
  continue reading
Step inside the diverse and fascinating worlds of cybersecurity professionals around the globe and hear their personal stories in their own words.
…
  continue reading
Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, …
…
  continue reading
Please enjoy this encore of Word Notes. The potential next evolution of the worldwide web that decentralizes interaction between users and content away from the big silicon valley social media platforms like Twitter, Facebook, and YouTube, and towards peer-to-peer interaction using blockchain as the underlying technology. CyberWire Glossary link: …
…
  continue reading
1
Privacy needs where you least expect it. [CISO Perspectives]
36:08
36:08
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
36:08When discussing privacy risks, many often look to implementing strong encryption, secure data storage practices, and data sanitization processes to help ensure sensitive information remains protected. Though these practices are good and should be prioritized, many often miss other key areas that need just as much focus. As the internet of things ha…
…
  continue reading
Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, …
…
  continue reading
The FCC plans to roll back cybersecurity mandates that followed Salt Typhoon. The alleged cybercriminal MrICQ has been extradited to the U.S. Ransomware negotiators are accused of conducting ransomware attacks. Ernst & Young accidentally exposed a 4-terabyte SQL Server backup. A hacker claims responsibility for last week’s University of Pennsylvani…
…
  continue reading
SpaceX’s Bandwagon-4 mission launched on Sunday from Florida carrying 18 payloads for KOREA ADD, Exolaunch, Fergani, Tomorrow Companies Inc., Starcloud, and Vast. India launched the CMS-03 satellite to provide communication services over the Indian landmass and a wide oceanic region. China’s Shenzhou-21 crew arrived at the Tiangong Space Station 3.…
…
  continue reading
1
Arti Lalwani: Supporting and being the change. [Risk Management] [Career Notes]
8:28
8:28
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
8:28Risk Management and Privacy Knowledge Leader at A-LIGN, Arti Lalwani shares her story from finance to risk management and how she made the transition. Arti started her career in finance after graduating with a finance degree. Quickly learning the field was not for her, she decided to dip her toes into the tech world. She credits her mentors for hel…
…
  continue reading
1
Arti Lalwani: Supporting and being the change. [Risk Management]
8:28
8:28
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
8:28Risk Management and Privacy Knowledge Leader at A-LIGN, Arti Lalwani shares her story from finance to risk management and how she made the transition. Arti started her career in finance after graduating with a finance degree. Quickly learning the field was not for her, she decided to dip her toes into the tech world. She credits her mentors for hel…
…
  continue reading
1
Attack of the automated ops. [Research Saturday]
19:40
19:40
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
19:40Today we are joined by Dario Pasquini, Principal Researcher at RSAC, sharing the team's work on WhenAIOpsBecome “AI Oops”: Subverting LLM-driven IT Operations via Telemetry Manipulation. A first-of-its-kind security analysis showing that LLM-driven AIOps agents can be tricked by manipulated telemetry, turning automation itself into a new attack vec…
…
  continue reading
1
The atmospheric impacts of satellite re-entry.
26:07
26:07
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
26:07When satellites burn up upon re-entering Earth’s atmosphere, they release particles and gases, including metals like aluminium, which may affect atmospheric chemistry. This process, known as atmospheric ablation, is still poorly understood, but early evidence suggests metal content in the atmosphere is rising. To address these uncertainties, the UK…
…
  continue reading
CISA says cooperation between federal agencies and the private sector remains steady. Long-standing Linux kernel vulnerability in active ransomware campaigns confirmed. A Chinese-linked group targets diplomatic organizations in Hungary, Belgium, and other European nations. A government contractor breach exposes data of over 10 million Americans. Lu…
…
  continue reading
The European Space Agency (ESA) is establishing its first hub in Asia with a new office in Tokyo, Japan. Luxembourg telecommunications company OrbitsIQ Global has acquired UNIO Enterprise. Space infrastructure company Catalyx Space has raised $5.4 million in an oversubscribed Seed funding round, and more. Remember to leave us a 5-star rating and re…
…
  continue reading
Happy Halloween from the team at N2K Networks! We hope you share in our Halloween tradition of listening to the Malware Mash. You can check out our video here. Lyrics I was coding in the lab late one night when my eyes beheld an eerie sight for my malware threat score began to rise and suddenly to my surprise... It did the Mash It did the Malware…
…
  continue reading
Happy Halloween from the team at N2K Networks! We hope you share in our Halloween tradition of listening to the Malware Mash. You can check out our video here. Lyrics I was coding in the lab late one night when my eyes beheld an eerie sight for my malware threat score began to rise and suddenly to my surprise... It did the Mash It did the Malware…
…
  continue reading
Welcome back to The FAIK Files! This week, we're bringing you an interview from the vault. On January 13th 2025, we had a chance to sit down with Erica Orange! Erica is the author of AI + The New Human Frontier, where she explores the profound impact of AI on humanity’s future, offering visionary insights into the intersection of technology, trust,…
…
  continue reading
A Texas telecom confirms a nation-state attack. A global outage disrupts Azure and Microsoft 365 services. Malicious npm packages steal sensitive data from Windows, Linux, and macOS systems. Hacktivists have breached multiple critical infrastructure systems across Canada. Major chipmakers spill the TEE. TP-Link home routers fall under federal scrut…
…
  continue reading
1
China says it’ll land humans on the Moon by 2030.
32:11
32:11
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
32:11China says it's on course to land astronauts on the Moon by 2030. stc group has committed to a prepayment of $175 million for future services from AST SpaceMobile (AST). Japan’s Axelspace Corporation has signed agreements with governmental organizations from Ghana and Kenya to support Earth Observation (EO) data usage, and more. Remember to leave u…
…
  continue reading
In this episode of Threat Vector, host David Moulton speaks with Asher Davila, Principal Security Researcher at Palo Alto Networks, about the newly released 2025 Device Security Enterprise Threat Report. This data-rich report reveals that over 21% of connected enterprise devices have known vulnerabilities, and nearly 40% of devices registered in Ac…
…
  continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, …
…
  continue reading
1
Cybersecurity on the ballot in California.
32:27
32:27
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
32:27Next week, California will hold a major election on Tuesday, November 4, amid heightened cyber risk and increased exposure to potential attacks. With the ongoing government shutdown and reduced grant funding for local counties overseeing the elections, vulnerabilities are growing. Sanny Liao, Co-Founder and CTO of Fable Security, joins to discuss t…
…
  continue reading
Explosions rock a shuttered Myanmar cybercrime hub. The Aisuru botnet shifts from DDoS to residential proxies. Dentsu confirms data theft at Merkle. Boston bans biometrics. Proton restores journalists’ email accounts after backlash. Memento labs admits Dante spyware is theirs. Australia accuses Microsoft of improperly forcing users into AI upgrades…
…
  continue reading
Japan’s HTV-X cargo spacecraft has arrived at the International Space Station for the first time ever. Japan’s SKY Perfect JSAT Corporation has signed a memorandum of understanding with Korea’s KT SAT to jointly develop and test 5G Non-Terrestrial Network (NTN) technologies. The US Federal Communications Commission (FCC) voted to kick off two proce…
…
  continue reading
WSUS attacks escalate as emergency patch fails to fully contain exploited flaw. Schneider Electric and Emerson are listed among victims in the Oracle EBS cyberattack. Google debunks reports of a massive GMail breach. A new banking trojan mimics human behavior for stealth. Sweden’s power grid operator confirms a cyberattack. Italian spyware targets …
…
  continue reading