logo
episode-header-image
Mar 2023
6m 44s

Device trust (noun) [Word Notes]

N2K Networks
About this episode
The process of verifying that a device is known, secure, and uncompromised before allowing it to connect to a network or access resources. CyberWire Glossary link: https://thecyberwire.com/glossary/device-trust Audio reference link: “Favorite Scene of Alan Rickman from Die Hard.” YouTube, YouTube, 14 Jan. 2016, https://www.youtube.com/watch?v=mklnXM3LIXo. 
Up next
Jul 10
Convinced, compromised, and confirmed.
This week, our hosts⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠Dave Bittner⁠⁠⁠, ⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are back sharing the latest in social engineering scams, phishing schemes, and criminal exploits that a ... Show More
51m 16s
Jul 8
adversary group naming (noun) [Word Notes]
Please enjoy this encore of Word Notes. A cyber threat intelligence best practice of assigning arbitrary labels to collections of hacker activity across the intrusion kill chain. 
10m 17s
Jul 3
Brushed aside: The subtle scam you didn't order.
This week, our hosts⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠Dave Bittner⁠⁠, ⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are back sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making ... Show More
44 m
Recommended Episodes
Dec 2022
Ransomware (noun)
Malware that disables a system in exchange for a ransom, usually by encrypting the system's data until the user pays for the decryption key.CyberWire Glossary link: https://thecyberwire.com/glossary/ransomwareAudio reference link: https://watch.amazon.com/detail?gti=amzn1.dv.gti. ... Show More
7m 46s
Dec 2022
Encore: MITRE ATT&CK (noun)
A knowledge base of adversary tactics, techniques, and procedures established and maintained by the MITRE Corporation. CyberWire Glossary link: https://thecyberwire.com/glossary/mitre-attckAudio reference link: “Attack Frameworks - SY0-601 CompTIA Security+ : 4.2,” Professor Mess ... Show More
7m 43s
Jul 2019
GandCrab hoods may be back with new ransomware. Video-on issues. Broadcom-Symantec talks are off, for now. Treason or just business? Robo-calls. A decryptor for Ims0rry ransomware.
The retirement of GandCrab’s hoods may have been exaggerated. Video conferencing tools RingCentral and Zhumu may have picked up Zoom’s issues in the tech they licensed. Broadcom’s projected acquisition of Symantec is on hold, at least for now. One Silicon Valley executive calls a ... Show More
21m 29s
Jan 2023
CIRT (noun)
A team responsible for responding to and managing cybersecurity incidents involving computer systems and networks in order to minimize the damage and to restore normal operations as quickly as possible.CyberWire Glossary link: https://thecyberwire.com/glossary/cirtAudio reference ... Show More
6m 36s
Aug 2008
How Bluetooth Works
Security is a concern in any wireless network setup. People sending sensitive information over a wireless connection need to take precautions to make sure those signals aren't intercepted. Learn more about Bluetooth security in our HowStuffWorks article. Learn more about your ad- ... Show More
10m 59s
Feb 2021
Tue. 02/09 – Amazon To Release An Alexa ‘Command Center?’
Amazon is ginning up a new Echo device that’s like a dashboard for your household. Big changes to Android leaked to the internet. Reddit raises a big round. Mark Cuban is gunning for Clubhouse. And I’ve been warning y’all of industrial hacking. We almost had a big disaster down i ... Show More
19m 34s
Feb 2021
He Hacked Into Apple and Microsoft with this genius trick
Guys this is absolutely genius and nuts! I have never seen anything like this before. This guy got access to paypal json and saw some private packages.. created public ones with a similar name and then made them do bad things, then thing because firewalls will shut those down.. h ... Show More
16m 11s