CISA adds three entries to its Known Exploited Vulnerabilities Catalog. "Hydrochasma" is a new cyberespionage threat actor. IBM claims the biggest effect of cyberattacks in 2022 was extortion. Social network hijacking in the C2C market. A credential theft campaign against data centers. LockBit claims an attack on a water utility in Portugal. Tim Starks from ... Show More
Apr 18
A new breed of RAT. [Research Saturday]
Today we are joined by Dr. Darren Williams, Founder and CEO of BlackFog, to discuss his team's work on "Steaelite RAT Enables Double Extortion Attacks from a Single Panel." A new remote access trojan, Steaelite, is being marketed on underground forums as an all-in-one platform th ... Show More
21m 52s
Oct 2025
The $25M Zoom Call: How Deepfakes Are Rewriting the Rules of Trust, Featuring KnowBe4's Erich Kron
<p>A Hong Kong employee sits through what seems like a routine video call with colleagues and the CFO. Everything looks normal. Then comes the urgent wire transfer request. $25 million later, the horrifying truth emerges: every face on that call was fake, generated by AI.</p>
<p> ... Show More
38m 18s
Feb 2025
10,000 Days in Cybersecurity
Cybersecurity has changed dramatically over the past 10,000 days. In this episode of Threat Vector, host David Moulton speaks with Haider Pasha, Chief Security Officer for EMEA & LATAM at Palo Alto Networks, about how the field has evolved and what’s coming next. From his early e ... Show More
36m 19s
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start off w ... Show More