The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
1
Retirement plan breach shakes financial giant.
39:57
39:57
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
39:57
A breach at J.P. Morgan Chase exposes data of over 451,000 individuals. President Biden Signs a National Security Memorandum to Strengthen and Secure U.S. Critical Infrastructure. Verizon’s DBIR is out. Cornell researchers unveil a worm called Morris II. A prominent newspaper group sues OpenAI. Marriott admits to using inadequate encryption. A Finn…
…
continue reading
1
Ransomware is just a prescription for chaos.
30:36
30:36
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
30:36
UnitedHealth’s CEO testimony before congress reveals details of the massive data breach. Major US mobile carriers are hit with hefty fines for sharing customer data. Muddling Meerkat manipulates DNS. A report from Sophos says ransomware payments skyrocketed this past year. The DOE addresses risks and benefits of AI. LightSpy malware targets macOS. …
…
continue reading
1
An unprecedented surge in credential stuffing.
31:42
31:42
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
31:42
Okta warns of a credential stuffing spike. A congressman looks to the EPA to protect water systems from cyber threats. CISA unveils security guidelines for critical infrastructure. Researchers discover a stealthy botnet-as-a-service coming from China. The UK prohibits easy IoT passwords. New vulnerabilities are found in Intel processors. A global b…
…
continue reading
1
Encore: Jack Rhysider: Get your experience points in everything. [Media] [Career Notes]
7:54
7:54
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
7:54
Host of Darknet Diaries podcast Jack Rhysider shares his experiences from studying computer engineering at university to his strategy of using gamification on his career that led to him landing in the security space. Jack talks about how his wide experiences came together in security and what prompted him to learn podcasting. Jack endeavors to shar…
…
continue reading
1
Cerber ransomware strikes Linux. [Research Saturday]
15:34
15:34
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
15:34
Christopher Doman, Co-Founder and CTO at Cado Security, is talking about their research on "Cerber Ransomware: Dissecting the three heads." This research delves into Cerber ransomware being deployed onto servers running the Confluence application via the CVE-2023-22518 exploit. The research states "Cerber emerged and was at the peak of its activity…
…
continue reading
1
Kaiser Permanente's privacy predicament.
28:51
28:51
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
28:51
Healthcare providers report breaches affecting millions. PlugX malware is found in over 170 countries. Hackers exploit an old vulnerability to launch Cobalt Strike. A popular Wordpress plugin is under active exploitation. Developing nations may serve as a test bed for malware developers. German authorities question Microsoft over Russian hacks. CIS…
…
continue reading
1
Cyber Talent Insights: Strengthening the cyber talent pipeline apparatus. (Part 3 of 3) [Special Edition]
55:00
55:00
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
55:00
Join us for this special three-part series where the N2K Cyber Talent Insights team guides you through effective strategies to develop your cybersecurity team, helping you stay ahead in the constantly changing cybersecurity landscape. In this episode, we center our conversation around the Cyber Workforce Pipeline. We discuss where the next great wa…
…
continue reading
1
The shadowy adversary in Cisco's crosshairs.
29:31
29:31
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
29:31
Cisco releases urgent patches for their Adaptive Security Appliances. Android powered smart TVs could expose Gmail inboxes. The FTC refunds millions to Amazon Ring customers. The DOJ charges crypto-mixers with money laundering. A critical vulnerability has been disclosed in the Flowmon network monitoring tool. A Swiss blood donation company reopens…
…
continue reading
1
Iran's covert cyber operations exposed.
42:18
42:18
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
42:18
The DOJ indicts four Iranian nationals on hacking charges. Legislation to ban or force the sale of TikTok heads to the President’s desk. A Russian hack group claims a cyberattack on an Indiana water treatment plant. A roundup of dark web data leaks. Mandiant monitors dropping dwell times. Bcrypt bogs down brute-forcing. North Korean hackers target …
…
continue reading
1
Visa crackdown against spyware swindlers.
35:52
35:52
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
35:52
The State Department puts visa restrictions on spyware developers. UnitedHealth says its recent breach could affect tens of millions of Americans. LockBit leaks data allegedly stolen from the DC government. Microsoft says APT28 has hatched a GooseEgg. The White House and HHS update HIPAA rules to protect private medical data. Keyboard apps prove vu…
…
continue reading
1
Renewed surveillance sparks controversy.
35:37
35:37
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
35:37
Section 702 gets another two years. MITRE suffers a breach through an Ivanti VPN. CrushFTP urges customers to patch an actively exploited flaw. SafeBreach researchers disclose vulnerabilities in Windows Defender that allow remote file deletion. Ukrainian soldiers see increased attention from data-stealing apps. GitHub’s comments are being exploited…
…
continue reading
1
Encore: Kiersten Todt: problem solving and building solutions. [Policy] [Career Notes]
7:26
7:26
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
7:26
Managing director of the Cyber Readiness Institute Kiersten Todt shares how she came to be in the cybersecurity industry helping to provide free tools and resources for small businesses through a nonprofit. She describes how her work on the Hill prior to and just after 9/11 changed. Kiersten talks about the diversity of skills that benefit work in …
…
continue reading
1
Cloud Architect vs Detection Engineer: Mutual benefit. [CyberWire-X]
18:23
18:23
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
18:23
In this episode of CyberWire-X, N2K CyberWire’s Podcast host Dave Bittner is joined by Brian Davis, Principal Software Engineer, and Thomas Gardner, Senior Detection Engineer, both from Red Canary. They engage in a cloud architect vs. detection engineer discussion. Through the conversation, they illustrate how one person benefits the other's work a…
…
continue reading
1
The art of information gathering. [Research Saturday]
31:48
31:48
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
31:48
Greg Lesnewich, senior threat researcher at Proofpoint, sits down to discuss "From Social Engineering to DMARC Abuse: TA427’s Art of Information Gathering." Since 2023, TA427 has directly solicited foreign policy experts for their opinions on nuclear disarmament, US-ROK policies, and sanction topics via benign conversation starting emails. The rese…
…
continue reading
1
Swift responses to cyberattacks.
31:22
31:22
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
31:22
Two swift responses to recent cyberattacks. Frontier Communications discloses cyberattack. Texas town repels water system cyberattack by unplugging. List of undesirables falls into the wrong hands. CryptoChameleon phishing kit impersonates LastPass. Ransomware payments trending down in Q1 2024 and a warning for small to medium-sized businesses. US …
…
continue reading
1
Cyber Talent Insights: Charting your path in cybersecurity. (Part 2 of 3) [Special Edition]
52:44
52:44
נגן מאוחר יותר
נגן מאוחר יותר
רשימות
לייק
אהבתי
52:44
Join us for this special three-part series where the N2K Cyber Talent Insights team guides you through effective strategies to develop your cybersecurity team, helping you stay ahead in the constantly changing cybersecurity landscape. In this episode, we shift our point of view to provide guidance for an individual's first career or perhaps conside…
…
continue reading
A major Phishing-as-a-service operation gets taken down by international law enforcement. US election officials are warned of nation-state influence operations. The house votes to limit the feds’ purchase of citizens personal data. A Michigan healthcare provider suffered a ransomware attack. Critical infrastructure providers struggle to trust cyber…
…
continue reading