logo
episode-header-image
Nov 2019
21m 47s

Arrest by algorithm. Dangers of data enr...

N2K Networks
About this episode
A defection and a leak expose Chinese espionage and social control operations. Data aggregation and enrichment seem to underlie a big inadvertent data exposure. Something seems to be up in Kazakhstan’s networks. The US FCC takes a swing at Huawei and ZTE. Russia moves closer to its desired Internet sovereignty. A Chuckling Squad member is in custody. A spy g ... Show More
Up next
Yesterday
Persistent threats in a shifting battlefield.
Iran’s cyber ops stay resilient. U.S. lawmakers press Big Tech on EU rules. Researchers expose a Fancy Bear server. Japan moves toward offensive cyber. CISA calls for cross-agency teamwork. New malware targets network infrastructure. AI fooled by font-based attacks. Schneider Ele ... Show More
31m 56s
Mar 17
Europe clamps down on global hackers.
The EU imposes sanctions after cyberattacks. DHS boosts surveillance spending. AI firms recruit weapons-risk experts. Stryker disruption, no patient impact. LeakNet leans on ClickFix. Sears chatbot data spills. A Chinese security firm leaks a private key. Tech giants team up on s ... Show More
27m 16s
Mar 17
Mid season reflection with Kim Jones. [CISOP]
In this mid-season episode, Kim takes a step back to reflect on the journey so far—revisiting key conversations, standout moments, and recurring themes that have shaped the season. During the episode, Kim sits down with N2K's own Ethan Cook to connect the dots across episodes, un ... Show More
41m 27s
Recommended Episodes
Feb 2025
US-Russia Ukraine talks, European security and Delta plane flip
U.S. and Russian officials meet in Riyadh for the highest-level talks to date between the two former Cold War foes on ending the war in Ukraine. European leaders, worried about being sidelined, met in Paris to talk security guarantees from their side. Plus, several are injured as ... Show More
12m 27s
Apr 2023
ICYMI: WTH is Tik Tok So Dangerous? Klon Kitchen on How the Chinese Communist Party is Reading Your Keystrokes and Collecting Your Data
It’s spring break, and your kids might have more time on their hands… so we are revisiting one of our best and increasingly relevant episodes.Over a third of Americans spend hours every day on an app that directly feeds their data to the Chinese government. TikTok, owned by Chine ... Show More
51m 56s
Oct 2025
October Cybersecurity Month in Review: Insider Threats, AI's Role, and Cybercrime Trends
In this episode of 'Cybersecurity Today: Our Month in Review,' host Jim welcomes a panel including Tammy Harper from Flair, Laura Payne from White Tuque, and David Shipley, CEO of Beauceron Securities. The discussion kicks off with an overview of their plans for Cybersecurity Mon ... Show More
51m 43s
Sep 2025
Part Two: Former CIA Spies on America’s Decline, The Potential of WW3, & What’s Really Happening Behind the Scenes in the US Government
What’s REALLY Going On Behind the Scenes of the CIA, the Media, and the U.S. Government? On Mayim Bialik’s Breakdown, former CIA agents and intelligence officers Andrew & Jihi Bustamante (creators of the EverydaySpy podcast, authors of Shadow Cell: An Insider Account of America’s ... Show More
51m 42s
Sep 2025
Lockbit Is Back
Emerging Cybersecurity Threats: Lockbit 5.0, Salesforce AI Vulnerabilities, and China's Cyber Intelligence Advancements In this episode of 'Cybersecurity Today,' host Jim Love discusses the latest cybersecurity threats, including the emergence of Lockbit 5.0 ransomware which can ... Show More
9m 30s
Aug 2025
Data Of 280,000 Aussies Leaked In Cyber Attack
Hundreds of thousands of Aussies have had their information leaked in a cyber attack involving internet provider iiNet; Ukrainian President Volodymyr Zelenskyy says he’s ready to meet Russian President Vladimir Putin for talks; A woman known as the ‘Ketamine Queen' has agreed to ... Show More
3m 12s
Oct 2025
The $25M Zoom Call: How Deepfakes Are Rewriting the Rules of Trust, Featuring KnowBe4's Erich Kron
<p>A Hong Kong employee sits through what seems like a routine video call with colleagues and the CFO. Everything looks normal. Then comes the urgent wire transfer request. $25 million later, the horrifying truth emerges: every face on that call was fake, generated by AI.</p> <p> ... Show More
38m 18s
May 2024
Critical infrastructure: Pending legislation and risks and rewards from AI.
Mandiant ties OT attacks to Sandworm. Russia-linked hackers target Texas water utilities. Belarusian hacktivists hit fertilizer company. CISA issues eight ICS advisories. Dave Bittner's Caveat podcast co host Ben Yelin joins him to discuss pending legislation with potential to af ... Show More
24m 20s