logo
episode-header-image
Jan 2023
28m 47s

Disentangling cybercrime from cyberespio...

N2K Networks
About this episode
DragonSpark conducts "opportunistic" cyberattacks in East Asia. ProxyNotShell and OWASSRF exploit chains target Microsoft Exchange servers. The IoT supply chain is threatened by exploitation of Realtek Jungle SDK vulnerability. CISA adds an entry to its Known Exploited Vulnerabilities Catalog. A Cisco study finds organizations see positive returns from inves ... Show More
Up next
Yesterday
The Supreme Court sits on the geofence.
The Supreme Court weighs geofence warrants. Iran leans toward quieter cyber ops. Researchers unpack Fast16 sabotage malware. Microsoft tracks an Outlook outage. Snow malware moves deep inside networks. Itron reports a breach. SMS blasters hit Canada. Italy extradites an accused h ... Show More
29m 48s
Apr 26
Adam Marrè: Learning to be a leader. [CISO] [Career Notes]
Please enjoy this encore of Career Notes. Adam Marrè, CISO from Arctic Wolf, sits down to share his story of rising through the ranks. After 9/11 he decided he wanted to make a difference in the world, and so he chose to go into the FBI. There he learned the skills that got him t ... Show More
11m 31s
Apr 25
A QRazy clever scam. [Research Saturday]
This week, we are joined by Juliana Testa, Senior Security Engineer from 7AI, sharing their work on "Quish Splash - When the QR Code Is the Weapon: A Multi-Wave Phishing Campaign That Slipped Past Every Filter." A large-scale “quishing” campaign used QR codes embedded in image at ... Show More
18m 53s
Recommended Episodes
Apr 2020
NSO Employee Abused Phone Hacking Tech to Target a Love Interest
Back in 2013, between the many revelations on mass surveillance abuses by the NSA coming from the trove of Snowden leaks, Americans also learned agents at the signals intelligence agency were snooping on their love interests. Dubbed LOVEINT (a play on ‘Love-Intelligence,’ apparen ... Show More
28m 57s
Oct 2019
E992: The Next Unicorns: Expanse CEO & Co-founder Tim Junio reduces exposure to online threats by providing “attack surface visibility”, shares insights into current threats from China & Russia, potential 2020 election tampering, reasons for cybersecurity optimism & more – E8 of 10-ep miniseries
0:50 Jason intros Tim Junio<br /> 1:44 Tim explains what Expanse does and how "attack surface inventory" is the first step in their cybersecurity platform<br /> 5:20 Tim explains the Dyn cyber attack<br /> 13:20 How many Fortune 500 companies have been blackmailed via cyber at ... Show More
1h 37m
Jun 2021
How the FBI Ran Its Own Texting App to Catch Criminals
It’s basically the FBI’s greatest fantasy come to life: Owning an operating an encrypted communications company exclusively used by some of the world’s most hardened and organized criminals.“Anom” the subscription based network operated by the feds, was used as the ultimate spy t ... Show More
28m 52s