logo
episode-header-image
Jul 2018
21m 33s

Leafminer wants to learn from the best, ...

N2K Networks
About this episode
In today's podcast, we hear that Leafminer is infesting networks in the Middle East. Red Alert, Kronos, Mirai, and Gafgyt make their reappearance in new forms. Shipping firm Cosco is dealing with a cyberattack. US officials raise warnings about Russian threats to the power grid and elections. Congress considers cyber retaliation. A dispute over cyber insuran ... Show More
Up next
Yesterday
DOGE and the data trail.
DOGE staff face scrutiny over possible Hatch Act violations. GitLab fixes a serious 2FA bypass. North Korean hackers target macOS developers through Visual Studio Code. Researchers say the VoidLink malware may be largely AI-built. MITRE rolls out a new embedded systems threat mat ... Show More
27m 2s
Jan 20
Million-dollar hacks and a manhunt.
Authorities pursue Black Basta. British authorities launch a new national service to fight fraud and cybercrime. LinkedIn private messages get infected with RATs. Researchers uncover a new malicious extension that intentionally crashes the browser. Ingram Micro discloses a ransom ... Show More
23m 12s
Jan 20
Are we a trade or a profession? [CISO Perspectives]
Please enjoy this encore of CISO Perspectives. We're sharing a episode from another N2K show we thought you might like. It's the second episode of the new season of the show CISO Perspectives with Kim Jones. Enjoy! Show Notes: Cybersecurity has an identity problem where the indus ... Show More
44m 33s
Recommended Episodes
Feb 2021
Nicole Perlroth, "This Is How They Tell Me the World Ends: The Cyberweapons Arms Race" (Bloomsbury, 2021)
For years, cybersecurity experts have debated whether cyber-weapons represent a destabilizing new military technology or merely the newest tool in the spies’ arsenal. In This Is How They Tell Me the World Ends (Bloomsbury, 2021), Nicole Perlroth makes a compelling case that cyber ... Show More
58m 4s
Jun 2021
Cyberguerre: des conflits invisibles aux conséquences bien réelles
<p>Aucun coup n'est tiré, mais les dégâts peuvent être considérables et les conséquences, dramatiques. Souvent silencieuses, parfois spectaculaires, les cyberattaques se multiplient –qu'elles soient le fait de simples criminels, d'États souverains ou d'une collaboration des deux. ... Show More
26m 17s