The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
1
From phishing to felony.
34:15
34:15
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
34:15
A major Phishing-as-a-service operation gets taken down by international law enforcement. US election officials are warned of nation-state influence operations. The house votes to limit the feds’ purchase of citizens personal data. A Michigan healthcare provider suffered a ransomware attack. Critical infrastructure providers struggle to trust cyber…
…
continue reading
1
The rebirth of Russia's cyber warfare.
32:04
32:04
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
32:04
A Russian hacker group boldly targets critical infrastructure. The Change Healthcare ransomware attack is projected to cost over a billion dollars. Three hundred bucks is the going rate for a SIM swap. PuTTY potentially reveals private keys. Cisco Talos reports a surge in brute-force attacks. Ivanti updates its MDM product. Omni Hotels & Resorts co…
…
continue reading
1
Weathering the phishing front.
35:56
35:56
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
35:56
Cisco Dou warns of a third-party MFA-related breach. MGM Resorts sues to stop an FTC breach investigation. Meanwhile the FTC dings another mental telehealth service provider. Open Source foundations call for caution after social engineering attempts. The NSA shares guidance for securing AI systems. IntelBroker claims to have hit a US geospatial int…
…
continue reading
1
Hunting vulnerabilities.
32:12
32:12
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
32:12
Palo Alto Networks releases hotfixes for an exploited zero-day. Delinea issues an urgent update for a critical flaw. Giant Tiger data is leaked online. A European semiconductor manufacturer deals with a data breach. Roku suffers its second breach of the year. Operators of the Hive RAT face charges. A former Amazon security engineer gets three years…
…
continue reading
1
AWS in Orbit: Extending the resilient edge to space. [T-Minus AWS in Orbit]
24:32
24:32
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
24:32
You can learn more about AWS in Orbit at space.n2k.com/aws. N2K Space is working with AWS to bring the AWS in Orbit podcast series to the 39th Space Symposium in Colorado Springs from April 8-11. Our guests today are Clint Crosier, Director at AWS Aerospace and Satellite, and Jim Tran, Vice President of Government Solutions at Iridium. AWS in Orb…
…
continue reading
Founder and CEO Stu Sjouwerman takes us on a journey of how his career developed from starting a software service company to currently focusing on the infosec side of the business where his team essentially helps to create human firewalls. Stu talks about learning all aspects of the business while creating startups and suggests you learn to speak t…
…
continue reading
1
AWS in Orbit: Building a resilient outernet. [T-Minus AWS in Orbit]
22:02
22:02
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
22:02
You can learn more about AWS in Orbit at space.n2k.com/aws. N2K Space is working with AWS to bring the AWS in Orbit podcast series to the 39th Space Symposium in Colorado Springs from April 8-11. Our guests today are Salem El Nimri, Chief of Space Technology at AWS Aerospace and Satellite, and Declan Ganley, Chairman and CEO at Rivada Space Netwo…
…
continue reading
1
Breaking down a high-severity vulnerability in Kubernetes. [Research Saturday]
15:45
15:45
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
15:45
Tomer Peled, a Security & Vulnerability Researcher from Akamai is sharing their work on "What a Cluster: Local Volumes Vulnerability in Kubernetes." This research focuses on a high-severity vulnerability in Kubernetes, allowing for remote code execution with system privileges on all Windows endpoints within a Kubernetes cluster. The research states…
…
continue reading
1
Privacy, power, and the path forward.
30:34
30:34
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
30:34
Section 702 edges closer to a vote. CISA provides guidance on Sisense and Microsoft breaches. A major conservative think tank reports a breach. Obsolete D-Link devices are under active exploitation, and Palo Alto warns of a zero-day. Raspberry Robin grows more stealthy. A lastpass employee thwarts a deepfake phishing attempt. Are AI models growing …
…
continue reading
1
Cyber Talent Insights: Navigating the landscape for enterprise organizations. (Part 1 of 3) [Special Edition]
44:17
44:17
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
44:17
Join us for this special three-part series where the N2K Cyber Talent Insights team guides you through effective strategies to develop your cybersecurity team, helping you stay ahead in the constantly changing cybersecurity landscape. In the first episode of the series on cybersecurity workforce development, we dive into the complex world of cyber …
…
continue reading
1
Apple's worldwide warning on mercenary attacks.
43:25
43:25
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
43:25
Apple warns targeted users of mercenary spyware attacks. CISA expands its Malware Next-Gen service to the private sector. US Cyber Command chronicles their “hunt forward” operations. Taxi fleets leak customer data. Trend Micro tracks DeuterBear malware. The BatBadBut vulnerability enables command injection on Windows. Cybercriminals manipulate GitH…
…
continue reading
1
From deadlock to debate on a revised Section 702 bill.
30:27
30:27
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
30:27
The House moves forward on Section 702 reauthorization. Ukraine suspends a top cybersecurity official. A Wisconsin health coop suffers a data breach. Sophos uncovers a malicious backdoor. Fortinet issues patches for critical and high severity vulnerabilities. A Microsoft server exposed employee passwords, keys, and credentials. LG releases patches …
…
continue reading
1
Unraveling a healthcare ransomware web.
30:02
30:02
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
30:02
Change Healthcare gets hit with another ransom demand. A French football team warns fans of a cyberattack. The Home Depot breach is chalked up to a misconfigured SaaS application. The FCC looks to sure up car connectivity security to protect survivors of domestic violence. Targus reports a disruptive cyberattack. A massive doxxing event hits El Sal…
…
continue reading
1
A possible breakthrough in data privacy legislation.
31:33
31:33
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
31:33
Might there be motion from Congress on data privacy legislation? Maryland passes a pair of privacy bills. A database allegedly from the EPA shows up on Russian cybercrime forums. HHS issues an alert for the Healthcare and Public Health sectors. CISA gears up for their Cyber Storm. A leading UK veterinary service provider suffers a cyber incident. A…
…
continue reading
1
Encore: Selena Larson: The Green Goldfish and cyber threat intelligence. [Analyst] [Career Notes]
7:40
Cyber threat intelligence analyst Selena Larson takes us on her career journey from being a journalist to making the switch to industrial security. As a child who wrote a book about a green goldfish who dealt with bullying, Selena always liked investigating and researching things. Specializing in cybersecurity journalism led to the realization of h…
…
continue reading
1
Leaking your AWS API keys, on purpose? [Research Saturday]
26:30
26:30
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
26:30
Noah Pack, a SANS Internet Storm Center Intern, sits down to discuss research on "What happens when you accidentally leak your AWS API keys?" This research is a guest diary from Noah and shares a project he worked on after seeing an online video of someone who created a python script that emailed colleges asking for free swag to be shipped to him. …
…
continue reading
1
Deciphering the Acuity cybersecurity incident.
33:52
33:52
Später Spielen
Später Spielen
Listen
Gefällt mir
Geliked
33:52
Acuity downplays its recent breach. IcedID gives way to a new malware strain. Russia arrests alleged credit card thieves. Wiz uncovers security flaws in Hugging Face AI models. NERC and the E-ISAC review lessons learned from simulated attacks on the electrical grid. UK police track honey traps targeting MPs. Microsoft says China is actively trying …
…
continue reading