Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading
The FAIK Files explores the mysterious and often wacky intersection of AI, technology, and humanity. From cognitive warfare to digital deception, we examine how AI is reshaping our reality through news, research, and real-world examples. Join us for a thought-provoking journey into a world where anything can be faked, truth is increasingly elusive, and human nature meets artificial intelligence head-on.
…
continue reading
T-Minus Space Daily from N2K CyberWire delivers critical daily intelligence on what powers, protects, and connects the space industry and innovation. N2K CyberWire’s space team makes visible the global connections that facilitate connectivity and commerce through space networks. We cover the news of the day and regularly feature experts covering space’s role in critical infrastructure and national security, space operations and intelligence, data and cybersecurity in space, domestic and inte ...
…
continue reading
"Only Malware in the Building” is a monthly podcast crafted through a collaboration between N2K CyberWire and the Proofpoint DISCARDED podcast. Join hosts Selena Larson, Threat Researcher at Proofpoint, Dave Bittner—host of the CyberWire Daily podcast—and Keith Mularski, former FBI Cyber Division Unit Chief and now Chief Global Officer at Qintel, as this trio of cyber-savvy partners-in-crime team up to uncover the secrets behind some of the most notorious cyberattacks. This segment focuses o ...
…
continue reading
Threat Vector is the hit podcast from Palo Alto Networks, with over 1 million downloads and growing. Get inside the minds of top cybersecurity leaders as they break down real threats, smart defenses, and what's coming next. Each episode features insights from industry experts, customers, and Palo Alto Networks teams. It is built for security pros who want to stay ahead.
…
continue reading
Step inside the diverse and fascinating worlds of cybersecurity professionals around the globe and hear their personal stories in their own words.
…
continue reading
Fortra confirms an exploitation of the maximum-severity GoAnywhere flaw. Harvard investigates a claim of a breach. Banking Trojan targets Brazilian WhatsApp users. Reduction-in-force hits CISA. SimonMed says 1.2 million hit by Medusa ransomware. Netherlands invokes the Goods Availability Act against a Chinese company. We have our Business Breakdown…
…
continue reading
New research shows around half of geostationary satellite signals are vulnerable to eavesdropping. China’s Space Pioneer raises approximately $350 million in its latest funding rounds. Impulse Space announces its new lunar lander plans, and more. Remember to leave us a 5-star rating and review in your favorite podcast app. Be sure to follow T-Minus…
…
continue reading
Please enjoy this encore of Word Notes. A process of hiding the complexity of a system by providing an interface that eases its manipulation. CyberWire Glossary link: https://thecyberwire.com/glossary/abstraction-layer Audio reference link: “What Is Abstraction in Computer Science,” by Codexpanse, YouTube, 29 October 2018.…
…
continue reading
While the N2K team is observing Indigenous Peoples' Day, we thought you'd enjoy this episode of the Threat Vector podcast from our N2K Cyberwire network partner, Palo Alto Networks. New episodes of Threat Vector release each Thursday. We hope you will explore their catalog and subscribe to the show. Join David Moulton, Senior Director of Thought Le…
…
continue reading
John Herrington was the first enrolled member of a Native American tribe to fly in space. He is a member of the Chickasaw Nation, a retired US Naval Aviator and Test Pilot, and a retired NASA Astronaut. Herrington was selected as a mission specialist for STS-113 and flew to the International Space Station on November 23, 2002. You can connect with …
…
continue reading
Please enjoy this encore of Career Notes. Founder and CTO of ShiftLeft, Chetan Conikee shares his story from computer science to founding his own company. When choosing a career, Chetan notes that "the liking and doing has to matter and be in conjunction with each other." Explaining the parallels in his home country of India and where he studied hi…
…
continue reading
Please enjoy this encore of Career Notes. Founder and CTO of ShiftLeft, Chetan Conikee shares his story from computer science to founding his own company. When choosing a career, Chetan notes that "the liking and doing has to matter and be in conjunction with each other." Explaining the parallels in his home country of India and where he studied hi…
…
continue reading
John Fokker, Head of Threat Intelligence at Trellix is discussing "Gang Wars: Breaking Trust Among Cyber Criminals." Trellix researchers reveal how the once-organized ransomware underworld is collapsing under its own paranoia. Once united through Ransomware-as-a-Service programs, gangs are now turning on each other — staging hacks, public feuds, an…
…
continue reading
The European Rocketry Challenge (EuRoC) is being held October 9-15 in Portugal. EuRoC is the first rocket launch competition for European university teams. The Portuguese Space Agency created the competition in 2020 and has since hosted teams from various European countries in the Alentejo region. We find out more about the 2025 competition from Ma…
…
continue reading
International law enforcement take down the Breachforums domains. Researchers link exploitation campaigns targeting Cisco, Palo Alto Networks, and Fortinet. Juniper Networks patches over 200 vulnerabilities. Apple and Google update their bug bounties. Evaluating AI use in application security (AppSec) programs. Microsegmentation can contain ransomw…
…
continue reading
Rocket Lab has signed a direct contract for two dedicated Electron launches with the Japan Aerospace Exploration Agency (JAXA). Viasat has been selected for a prime contract award by the US Space Force (USSF) Space Systems Command (USSF SSC) for the Protected Tactical SATCOM-Global (PTS-G) program. The European Space Agency (ESA) has awarded a cont…
…
continue reading
Jocelyn Burnham (she/her) is a leading independent artificial intelligence communicator, workshop leader, and speaker, specialising in AI learning in the creative and cultural sectors through creativity and playfulness. She has been commissioned by organisations including Arts Council England, Tate, The Church of England, Historic Royal Palaces, Ar…
…
continue reading
DHS reassigns cyberstaff to immigration duties. A massive DDoS attack disrupts several major gaming platforms. Discord refuses ransom after a third-party support system breach. Researchers examine Chaos ransomware and creative log-poisoning web intrusions. The FCC reconsiders its telecom data breach disclosure rule. Experts warn of teen recruitment…
…
continue reading
Stoke Space has raised $510 million in Series D funding. Muon Space has been awarded $44.6 million by the US Space Force for environmental monitoring. Momentus has been selected for two NASA demonstration flights, and more. Remember to leave us a 5-star rating and review in your favorite podcast app. Be sure to follow T-Minus on LinkedIn and Instag…
…
continue reading
Hybrid work has changed the game, but has your security kept up? In this episode of Threat Vector, David Moulton sits down with Harish Singh, Vice President and Global Head of Infrastructure and Application Management at Wipro, to unpack the evolving cybersecurity landscape at the intersection of digital transformation, SaaS expansion, and AI-power…
…
continue reading
Will Daugherty, US Head of Norton Rose Fulbright's Cybersecurity practice, discussing the upcoming expiration of CISA 2015. Ben discusses Apple’s decision to remove the ICEBlock app after pressure from the White House. Dave's got the story of the Secretary of Defense dialing back cyber training fro troops. While this show covers legal topics, and B…
…
continue reading
This week, our hosts Dave Bittner , Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits t…
…
continue reading
Chinese hackers infiltrate a major U.S. law firm. The EU Commission President warns Russia is waging a hybrid war against Europe. Researchers say LoJax is the latest malware from Russia’s Fancy Bear. Salesforce refuses ransom demands. London Police arrest two teens over an alleged ransomware attack on a preschool. Microsoft tightens Windows 11 setu…
…
continue reading
Verizon signs deal with AST SpaceMobile to deliver cellular service from space. Space Capital’s Q3 2025 Space IQ report shows a $5.8 billion surge in private space investment. Blue Origin awarded a $78.25M Space Force contract to expand launch processing at Canaveral. Remember to leave us a 5-star rating and review in your favorite podcast app. Be …
…
continue reading
توسط N2K Networks
…
continue reading
توسط N2K Networks
…
continue reading
توسط N2K Networks
…
continue reading
توسط N2K Networks
…
continue reading
توسط DISCARDED | N2K Networks
…
continue reading
A critical zero-day in Oracle E-Business Suite is under active exploitation. ICE plans a major expansion of its social media surveillance operations. Discord confirms a third-party data breach. A critical vulnerability in the Unity game engine could allow arbitrary code execution. New variants of the XWorm remote access trojan spread through phishi…
…
continue reading