logo
episode-header-image
Jun 2020
22m 3s

Cyberespionage and counterespionage. The...

N2K Networks
About this episode
What does Beijing want to know about US Presidential campaigns? Position papers, mostly. A redacted version of the CIA’s inquiry into the WikiLeaks Vault 7 material is out. That DDoS attack you read about on Twitter? Never happened. Former eBay employees face Federal charges of conspiracy to commit cyberstalking and witness tampering. Ben Yelin explains a ju ... Show More
Up next
Yesterday
When one weak link is enough.
Cloud platform Vercel confirms a data breach. Microsoft releases emergency updates to fix Windows Server restart loops. Bluesky gets DDoSed. Insurers keep close watch on an AI hiring discrimination suit. Cybersecurity workforce turnover rises. Scammers abuse Apple’s email notific ... Show More
28m 40s
Apr 19
Jaya Baloo: Don't be afraid to bounce ideas off your teammates. [CISO] [Career Notes]
Please enjoy this encore of Career Notes. Jaya Baloo, a Chief Information Security Officer from Avast sits down to share her story, sharing how she got into the technology field at a younger age with being introduced to computers and games on her PS 24. She started off going to c ... Show More
10m 34s
Apr 18
A new breed of RAT. [Research Saturday]
Today we are joined by Dr. Darren Williams, Founder and CEO of BlackFog, to discuss his team's work on "Steaelite RAT Enables Double Extortion Attacks from a Single Panel." A new remote access trojan, Steaelite, is being marketed on underground forums as an all-in-one platform th ... Show More
21m 52s
Recommended Episodes
Apr 2020
NSO Employee Abused Phone Hacking Tech to Target a Love Interest
Back in 2013, between the many revelations on mass surveillance abuses by the NSA coming from the trove of Snowden leaks, Americans also learned agents at the signals intelligence agency were snooping on their love interests. Dubbed LOVEINT (a play on ‘Love-Intelligence,’ apparen ... Show More
28m 57s
Jul 2023
Asaf Lubin on Cyber Espionage and International Law
<p>On June 16, the U.S. State Department discovered unauthorized access to its Exchange Online email services and reported it to Microsoft. Almost a month later, on July 11, Microsoft disclosed the attack, and attributed it to a China-based threat actor, which they call Storm-055 ... Show More
48m 46s
Feb 2021
Nicole Perlroth, "This Is How They Tell Me the World Ends: The Cyberweapons Arms Race" (Bloomsbury, 2021)
For years, cybersecurity experts have debated whether cyber-weapons represent a destabilizing new military technology or merely the newest tool in the spies’ arsenal. In This Is How They Tell Me the World Ends (Bloomsbury, 2021), Nicole Perlroth makes a compelling case that cyber ... Show More
58m 4s
Feb 2020
Lauri Love: The realities of cyber security
Stephen Sackur speaks to the accused computer hacker Lauri Love. For nations, corporations and all of us as individuals, the age of the internet has heightened vulnerability. Information and data - the most valuable of all commodities - are at risk from hackers, motivated by gree ... Show More
24m 9s