logo
episode-header-image
Mar 2023
27m 20s

Detecting sandbox emulations. VEC supply...

N2K Networks
About this episode
Malware could detect sandbox emulations. A VEC supply chain attack. A new APT is active in Russian-occupied sections of Ukraine. An alleged Russian patriot claims responsibility for the D.C. Health Link attack. CISA and NSA offer guidance on identity and access management (IAM). Tim Starks from the Washington Post has analysis on the BreachForums takedown. O ... Show More
Up next
Yesterday
Message in the malware.
CISA warns of spyware targeting messaging apps. CodeRED, this is not a test. Infostealer campaign spreads via malicious Blender files. Shai-Hulud’s second coming. Real estate finance firm SitusAMC investigates breach. Dartmouth College discloses Oracle EBS breach. Dave Bittner is ... Show More
23m 50s
Yesterday
A midseason takeaway. [CISO Perspectives]
In this mid-season episode, Kim takes a step back to reflect on the conversations he has had so far. During the episode, Kim sits down with N2K's own Ethan Cook to connect the dots across episodes, diving into how new technologies are impacting longstanding challenges, both from ... Show More
46m 37s
Nov 24
Inside job interrupted.
CrowdStrike fires an insider who allegedly shared screenshots with hackers. Google agrees, it wasn’t Salesforce. Cox Enterprises confirms Oracle EBS breach. Alleged Transport for London hackers plead not guilty. Hackers exploit new WSUS bug to deploy ShadowPad backdoor. Iberia di ... Show More
33m 51s
Recommended Episodes
Feb 2024
CISA Goes Rogue: How Cybersecurity Became Censorship | 2.25.24
The Cybersecurity and Infrastructure Security Agency faces claims it censors the American public and interferes in elections. After the debunked Russian collusion narrative and the Twitter files, some lawmakers now want to see the agency completely dismantled. Get the facts first ... Show More
27m 50s
Mar 2023
How A Satellite Hack Became a Cybersecurity Wakeup Call
People around the world rely on satellites for their internet connections, credit card transactions–and even to keep track of time.  Last year, a suspected Russian-led satellite hack exposed how vulnerable they are to security breaches, from individual hackers seeking to pilfer i ... Show More
31m 54s
Mar 2022
War in Ukraine: the cyber frontier
How the conflict in Ukraine is playing out in cyberspace. With the conflict in Ukraine still raging following Russia’s invasion Ed Butler speaks to hackers from Ukraine including Vlad Styran of Berezha Security Group, one of the people tasked with fending off digital attacks on U ... Show More
18m 4s
Dec 2021
Keeping Security Simple with Johanna Baum, the CEO and Founder of S3 (Strategic Security Solutions)
<p>There is a lot of conversation among IT security leaders about engaging the workforce in order to mitigate threats. But how do security professionals actually win people over to their side? Many employees are willing to comply but what can be done to really get through to thos ... Show More
41 m