The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
N2k Networks Inc Podcasts
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
A fun and informative cybersecurity audio glossary from N2K.
…
continue reading
The daily space intelligence and analysis that global space industry leaders and experts depend on. Published each weekday, this program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world. Visit us to learn more at https://space.n2k.com/
…
continue reading
Every Saturday, we sit down with cybersecurity researchers to talk shop about the latest threats, vulnerabilities, and technical discoveries.
…
continue reading
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading
Step inside the diverse and fascinating worlds of cybersecurity professionals around the globe and hear their personal stories in their own words.
…
continue reading
"Only Malware in the Building” is a monthly podcast crafted through a collaboration between N2K CyberWire and the Proofpoint DISCARDED podcast. Join hosts Selena Larson, Threat Researcher at Proofpoint, Dave Bittner—host of the CyberWire Daily podcast—and Keith Mularski, former FBI Cyber Division Unit Chief and now Chief Global Officer at Qintel, as this trio of cyber-savvy partners-in-crime team up to uncover the secrets behind some of the most notorious cyberattacks. This segment focuses o ...
…
continue reading
CISO Perspectives explores the evolving landscape of cybersecurity leadership, talent, and risk—because success in cybersecurity is about people, not just technology. Hosted by Kim Jones, veteran CISO and educator, this podcast challenges conventional thinking on leadership, talent pipelines, and the disconnects holding the profession back. Join Kim for candid discussions with industry leaders, and insights that help you build a stronger, more resilient cyber ecosystem.
…
continue reading
Get ready for a deep dive into what cybersecurity professionals often refer to as the "8th Layer" of security: HUMANS. Welcome to 8th Layer Insights (8Li). This podcast is a multidisciplinary exploration into how the complexities of human nature affect security and risk. Author, security researcher, and behavior science enthusiast Perry Carpenter taps experts for their insights and illumination. Topics include cybersecurity, psychology, behavior science, communication, leadership, and more.
…
continue reading
Readings from the dark underworld of cybercrime and espionage, recalled to life, reinterpreted, and reimagined for the benefit of the infosec literati. Oh, and it’s also just play and parody from the ever-restless imaginations of the N2K editorial team.
…
continue reading
Flash cybersecurity advisories from the US Government. These alerts provide timely technical and operational information, indicators of compromise, and mitigations for current major security threats, vulnerabilities, and exploits. These alerts have been edited and adapted for audio by N2K Networks as a public service.
…
continue reading
Control Loop is the OT Cybersecurity Podcast, your terminal for ICS security, intelligence, and learning. Every two weeks, we bring you the latest news, strategies, and technologies that industry professionals rely on to safeguard civilization.
…
continue reading
An occasional series from the team at the Hacking Humans podcast. N2K's Dave Bittner and co-host from the Johns Hopkins University Information Security Institute, Joe Carrigan, are joined by the N2K's Chief Security Officer and Chief analyst, Rick Howard. The team watches clips from some of their favorite movies, clips which demonstrate examples of the social engineering scams and schemes they talk about on Hacking Humans.
…
continue reading
This week on Caveat, Dave and Ben welcome back N2K’s own Ethan Cook for our latest policy deep dive segment. As our lead analyst, Ethan shares his knowledge of law, privacy, and surveillance on the latest policy developments shaping the cybersecurity and legal landscape. While this show covers legal topics, and Ben is a lawyer, the views expr…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are back sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Joe's sto…
…
continue reading
Patch Tuesday. The Matrix Foundation patches high-severity vulnerabilities in its open-source communications protocol. The “Curly COMrades” Russian-aligned APT targets critical infrastructure. Microsoft tells users to ignore new CertificateServicesClient (CertEnroll) errors. Researchers uncover a malware campaign hiding the NjRat Remote Access Troj…
…
continue reading

1
Vulcan Blasts Off, Ariane Delivers, and Portugal Joins the Spaceport Club.
15:12
15:12
Play later
Play later
Lists
Like
Liked
15:12A United Launch Alliance’s (ULA’s) Vulcan rocket launched from Cape Canaveral carrying the USSF-106 mission for the United States Space Force's (USSF’s) Space Systems Command (SSC). Arianespace’s Ariane 6 liftoff from the European Space Agency’s (ESA’s) spaceport in French Guiana carrying EUMETSAT's Metop-SGA1 satellite. The Atlantic Spaceport Cons…
…
continue reading
Hackers leak backend data from the North Korean state-sponsored hacking group Kimsuky. A ransomware attack on a Dutch clinical diagnostics lab exposes medical data of nearly half a million women. One of the world’s largest staffing firms suffers a data breach. Saint Paul, Minnesota, confirms the Interlock ransomware gang was behind a July cyberatta…
…
continue reading
Rocket Lab has completed the acquisition of the parent holding company of Geost. The Indian National Space Promotion and Authorisation Centre (IN-SPACe), has selected a consortium led by PixxelSpace to build a commercial sovereign constellation of Earth observation satellites. The European Space Agency (ESA) is deliberating moves to become less dep…
…
continue reading
Please enjoy this encore of Word Notes. The flagship product of the controversial Israeli spyware vendor, the NSO Group, use for remotely hacking mobile devices, most notably iPhones, via zero-click exploits. CyberWire Glossary link: https://thecyberwire.com/glossary/pegasus Audio reference link:“Cybersecurity beyond the Headlines: A Conversatio…
…
continue reading
Please enjoy this encore of Word Notes. The flagship product of the controversial Israeli spyware vendor, the NSO Group, use for remotely hacking mobile devices, most notably iPhones, via zero-click exploits. CyberWire Glossary link: https://thecyberwire.com/glossary/pegasus Audio reference link:“Cybersecurity beyond the Headlines: A Conversatio…
…
continue reading
CISA issues an Emergency Directive to urgently patch a critical vulnerability in Microsoft Exchange hybrid configurations. SoupDealer malware proves highly evasive. Google patches a Gemini calendar flaw. A North Korean espionage group pivots to financial crime. Russia’s RomCom exploits a WinRAR zero-day. Researchers turn Linux-based webcams into pe…
…
continue reading

1
Splashdowns, Satellites, and Space Crypto.
25:23
25:23
Play later
Play later
Lists
Like
Liked
25:23NASA’s SpaceX Crew 10 returns to Earth in a splash down off the coast of California. A Jielong-3 carrier rocket launched the Geely Constellation Group 04 satellites from the coastal waters off Shandong, China. ISRO announces that it will be launching another American satellite in the coming months, and more. Remember to leave us a 5-star rating and…
…
continue reading
Welcome to Deceptive Minds - An audio newsletter about how we are fooled, how we fool ourselves, and what we can do about it. This one is all about "The Long Con." When the lie moves in next door. Not every con kicks down the door. Some knock politely, charm their way inside, and stay for dinner. In this issue , we explore the anatomy of the long c…
…
continue reading

1
Ed Amoroso: Security shouldn't be the main dish. [Computer Science] [Career Notes]
11:03
11:03
Play later
Play later
Lists
Like
Liked
11:03Please enjoy this encore of Career Notes. Chief Executive Officer and Founder of TAG Cyber, Ed Amoroso, shares how he learned on the job and grew his career. In his words, Ed "went from my dad having an ARPANET connection and I'm learning Pascal, to Bell Labs, to CISO, to business, to quitting, to starting something new. And now I'm riding a new ex…
…
continue reading

1
Ed Amoroso: Security shouldn't be the main dish. [Computer Science]
11:03
11:03
Play later
Play later
Lists
Like
Liked
11:03Please enjoy this encore of Career Notes. Chief Executive Officer and Founder of TAG Cyber, Ed Amoroso, shares how he learned on the job and grew his career. In his words, Ed "went from my dad having an ARPANET connection and I'm learning Pascal, to Bell Labs, to CISO, to business, to quitting, to starting something new. And now I'm riding a new ex…
…
continue reading

1
When malware plays pretend. [Research Saturday]
20:30
20:30
Play later
Play later
Lists
Like
Liked
20:30Nicolás Chiaraviglio, Chief Scientist from Zimperium's zLabs, joins to discuss their work on "Behind Random Words: DoubleTrouble Mobile Banking Trojan Revealed." Zimperium’s zLabs team has been tracking an evolving banker trojan dubbed DoubleTrouble, which has grown more sophisticated in both its distribution and capabilities. Initially spread via …
…
continue reading

1
Supporting the Traffic Coordination System for Space.
18:25
18:25
Play later
Play later
Lists
Like
Liked
18:25In November 2024, Slingshot Aerospace was selected to develop the interface for the US Traffic Coordination System for Space (TraCSS). With the FY2026 budget still under discussion in the US, funding to support TraCSS is up in the air. Slingshot Aerospace has joined more than 450 companies, represented by seven leading space industry associations i…
…
continue reading
Nicolás Chiaraviglio, Chief Scientist from Zimperium's zLabs, joins to discuss their work on "Behind Random Words: DoubleTrouble Mobile Banking Trojan Revealed." Zimperium’s zLabs team has been tracking an evolving banker trojan dubbed DoubleTrouble, which has grown more sophisticated in both its distribution and capabilities. Initially spread via …
…
continue reading
Researchers uncover multiple vulnerabilities in a popular open-source secrets manager. Software bugs threaten satellite safety. Columbia University confirms a cyberattack. Researchers uncover malicious NPM packages posing as WhatsApp development tools.A new EDR killer tool is being used by multiple ransomware gangs. Home Improvement stores integrat…
…
continue reading

1
Hacking satellites to expose vulnerabilities.
20:43
20:43
Play later
Play later
Lists
Like
Liked
20:43VisionSpace Technologies has demonstrated how easy it is to exploit software vulnerabilities on satellites, as well as the ground stations that control them. China has conducted its first test of a lunar lander that they plan to use to take humans to the Moon. Rocket Lab has completed the Systems Integration Review (SIR) for the US Space Force’s VI…
…
continue reading
Microsoft warns of a high-severity vulnerability in Exchange Server hybrid deployments. A Dutch airline and a French telecom report data breaches. Researchers reveal new HTTP request smuggling variants. An Israeli spyware maker may have rebranded to evade U.S. sanctions. CyberArk patches critical vulnerabilities in its secrets management platform. …
…
continue reading
Firefly Aerospace announced the pricing of its upsized initial public offering (IPO), while MDA Space, BlackSky and Redwire reported Q2 financial updates. Intuitive Machines has signed a definitive agreement to acquire KinetX, Inc. NASA has selected six companies to produce studies focused on lower-cost ways to launch and deliver spacecraft of vari…
…
continue reading
On today’s show Ben’s got the story of how the UK’s new Online Safety Act, billed as a way to protect children, may actually end up doing more harm than good—with mandatory age checks, privacy concerns, and a growing backlash from users. Dave’s got the story of how Flock Safety is expanding its controversial license plate surveillance network into …
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are back sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some …
…
continue reading
Two Chinese nationals are arrested for allegedly exporting sensitive Nvidia AI chips. A critical security flaw has been discovered in Microsoft’s new NLWeb protocol. Vulnerabilities in Dell laptop firmware could let attackers bypass Windows logins and install malware. Trend Micro warns of an actively exploited remote code execution flaw in its endp…
…
continue reading
AST SpaceMobile plans to acquire global S-Band spectrum priority rights held under the International Telecommunication Union (ITU). Scout Space has completed its first suborbital Space Domain Awareness (SDA) test flight on Dawn Aerospace’s Aurora spaceplane. An Interlune payload will fly on Astrolab’s FLEX Lunar Innovation Platform (FLIP) rover on …
…
continue reading