Who’s been hacking aerospace firms? Context Security suggests it’s a new Chinese threat actor, “Avivore.” The FBI issues a ransomware alert. The NCSC warns of active exploitation of vulnerable VPNs. The EU issues a sweeping takedown order to Facebook. US Senators ask Facebook about deep fakes. Spearphishing at the Australian National University. FireEye may ... Show More
Yesterday
Cyber without borders: Reporters notebook. [Special Edition]
In this special Reporter’s Notebook, Maria Varmazis, host here at N2K CyberWire, takes listeners behind the scenes of our three-part series on Cyber Coalition 2025 in Tallinn, Estonia. After exploring real-time incident response, cross-border coordination, and the broader sta ... Show More
23m 3s
Oct 2023
AI Threats & Opportunities in Cyber Security With Material Security Co-Founder Ryan Noon
Cyber Security is going to change significantly in the era of AI, according to Ryan Noon, cofounder of Material Security, a security company that makes cloud-based Google and Microsoft email a safe place for sensitive data. Elad Gil and Ryan talk about how Material Security start ... Show More
36m 22s
Oct 2019
E992: The Next Unicorns: Expanse CEO & Co-founder Tim Junio reduces exposure to online threats by providing “attack surface visibility”, shares insights into current threats from China & Russia, potential 2020 election tampering, reasons for cybersecurity optimism & more – E8 of 10-ep miniseries
0:50 Jason intros Tim Junio<br />
1:44 Tim explains what Expanse does and how "attack surface inventory" is the first step in their cybersecurity platform<br />
5:20 Tim explains the Dyn cyber attack<br />
13:20 How many Fortune 500 companies have been blackmailed via cyber at ... Show More
1h 37m
Mar 2023
How A Satellite Hack Became a Cybersecurity Wakeup Call
People around the world rely on satellites for their internet connections, credit card transactions–and even to keep track of time. Last year, a suspected Russian-led satellite hack exposed how vulnerable they are to security breaches, from individual hackers seeking to pilfer i ... Show More
31m 54s