logo
episode-header-image
Mar 2023
27m 20s

Detecting sandbox emulations. VEC supply...

N2K Networks
About this episode
Malware could detect sandbox emulations. A VEC supply chain attack. A new APT is active in Russian-occupied sections of Ukraine. An alleged Russian patriot claims responsibility for the D.C. Health Link attack. CISA and NSA offer guidance on identity and access management (IAM). Tim Starks from the Washington Post has analysis on the BreachForums takedown. O ... Show More
Up next
Yesterday
Rooted and patient.
A China-linked group exploits a critical Dell zero-day for 18 months. A Microsoft 365 Copilot bug risks sensitive email oversharing. A new Linux botnet leans on old-school IRC for command and control. Switzerland tightens critical infrastructure rules with mandatory cyber reporti ... Show More
33m 22s
Feb 17
The lights stay on, but dimmer.
The government shutdown leaves CISA at reduced capacity. Ransomware and misconfigured AI threaten cyber-physical infrastructure. Operation DoppelBrand targets Fortune 500 financial and technology firms. Researchers uncover infostealers targeting OpenClaw AI. Identity-based attack ... Show More
27m 57s
Feb 16
Cyber without borders: How Estonia turned crisis into cyber power. [Special Edition]
In this three-part series, Maria Varmazis, host of T-Minus Space Daily and CyberWire Producer Liz Stokes, take you inside NATO’s flagship cyber defense exercise, Cyber Coalition 2025. Hosted by the NATO Cooperative Cyber Defence Centre of Excellence in Tallinn, Estonia, the exerc ... Show More
24m 47s
Recommended Episodes
Feb 2024
CISA Goes Rogue: How Cybersecurity Became Censorship | 2.25.24
The Cybersecurity and Infrastructure Security Agency faces claims it censors the American public and interferes in elections. After the debunked Russian collusion narrative and the Twitter files, some lawmakers now want to see the agency completely dismantled. Get the facts first ... Show More
27m 50s
Mar 2023
How A Satellite Hack Became a Cybersecurity Wakeup Call
People around the world rely on satellites for their internet connections, credit card transactions–and even to keep track of time.  Last year, a suspected Russian-led satellite hack exposed how vulnerable they are to security breaches, from individual hackers seeking to pilfer i ... Show More
31m 54s
Mar 2022
War in Ukraine: the cyber frontier
How the conflict in Ukraine is playing out in cyberspace. With the conflict in Ukraine still raging following Russia’s invasion Ed Butler speaks to hackers from Ukraine including Vlad Styran of Berezha Security Group, one of the people tasked with fending off digital attacks on U ... Show More
18m 4s
Dec 2021
Keeping Security Simple with Johanna Baum, the CEO and Founder of S3 (Strategic Security Solutions)
<p>There is a lot of conversation among IT security leaders about engaging the workforce in order to mitigate threats. But how do security professionals actually win people over to their side? Many employees are willing to comply but what can be done to really get through to thos ... Show More
41 m