logo
episode-header-image
Jan 2023
28m 47s

Disentangling cybercrime from cyberespio...

N2K Networks
About this episode
DragonSpark conducts "opportunistic" cyberattacks in East Asia. ProxyNotShell and OWASSRF exploit chains target Microsoft Exchange servers. The IoT supply chain is threatened by exploitation of Realtek Jungle SDK vulnerability. CISA adds an entry to its Known Exploited Vulnerabilities Catalog. A Cisco study finds organizations see positive returns from inves ... Show More
Up next
Yesterday
Signals, scams, and a Salesforce snatch.
Russian hackers target Signal and WhatsApp. Permit scammers impersonate local officials. Anthropic sues over a Pentagon blacklist. The White House moves to restore fraud victims. ShinyHunters target Salesforce data. Ericsson reports a breach. macOS users face ClickFix malware. AW ... Show More
24m 3s
Yesterday
What role does higher education play in cyber? [CISOP]
Show Notes: Cybersecurity has continued to grow and mature as a field over the past decade which has given rise to numerous degree pathways across dozens of collegiate institutions; however, the value of these degrees has continued to be a topic of debate. In this episode of CISO ... Show More
44m 22s
Mar 9
From Tehran to the Apple II.
Israel claims a strike on Iran’s cyber warfare headquarters. The Trump administration releases a new national cyber strategy. DHS shakes up its IT and cybersecurity leadership. Velvet Tempest uses ClickFix to drop loaders and RATs. Researchers uncover a Linux cryptocurrency clipb ... Show More
30m 30s
Recommended Episodes
Apr 2020
NSO Employee Abused Phone Hacking Tech to Target a Love Interest
Back in 2013, between the many revelations on mass surveillance abuses by the NSA coming from the trove of Snowden leaks, Americans also learned agents at the signals intelligence agency were snooping on their love interests. Dubbed LOVEINT (a play on ‘Love-Intelligence,’ apparen ... Show More
28m 57s
Oct 2019
E992: The Next Unicorns: Expanse CEO & Co-founder Tim Junio reduces exposure to online threats by providing “attack surface visibility”, shares insights into current threats from China & Russia, potential 2020 election tampering, reasons for cybersecurity optimism & more – E8 of 10-ep miniseries
0:50 Jason intros Tim Junio<br /> 1:44 Tim explains what Expanse does and how "attack surface inventory" is the first step in their cybersecurity platform<br /> 5:20 Tim explains the Dyn cyber attack<br /> 13:20 How many Fortune 500 companies have been blackmailed via cyber at ... Show More
1h 37m
Jun 2021
How the FBI Ran Its Own Texting App to Catch Criminals
It’s basically the FBI’s greatest fantasy come to life: Owning an operating an encrypted communications company exclusively used by some of the world’s most hardened and organized criminals. “Anom” the subscription based network operated by the feds, was used as the ultimate spy ... Show More
28m 52s