logo
episode-header-image
Aug 2023
29m 2s

Action in the cybercriminal underworld. ...

N2K Networks
About this episode
Open Bullet malware is seen in the wild. Threat actors exploit a Salesforce vulnerability for phishing. BlueCharlie (that’s Russia’s FSB) shakes up its infrastructure. Midnight Blizzard (and that’s Russia’s SVR) uses targeted social engineering. How NoName057(16) moved on to Spanish targets. Robert M. Lee from Dragos shares his reaction to the White House’s ... Show More
Up next
Today
Do certifications matter? [CISOP]
Show Notes: As the cybersecurity industry has grown, the field has struggled to answer the question: do certifications matter? In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with N2K's own, ⁠Simone Petrella, to answer this question and discuss why the value of c ... Show More
45m 33s
Yesterday
Unit 42's Iran Threat Brief: What We're Seeing [Threat Vector]
Unit 42 is tracking more than 60 active hacktivist groups and Iran-linked threat actors right now. What are they actually doing, what should you believe, and what should you do about it? In this episode of Threat Vector, David Moulton sits down with Justin Moore, Senior Manager o ... Show More
33m 54s
Yesterday
The internet joins the war.
Hacktivist activity surges in the Middle East. Defense tech firms distance themselves from Claude. International law enforcement take down the Leakbase cybercrime forum. A pair of Cisco SD-WAN vulnerabilities are under active exploitation. Google releases an urgent Chrome securit ... Show More
31m 18s
Recommended Episodes
Mar 2023
How A Satellite Hack Became a Cybersecurity Wakeup Call
People around the world rely on satellites for their internet connections, credit card transactions–and even to keep track of time.  Last year, a suspected Russian-led satellite hack exposed how vulnerable they are to security breaches, from individual hackers seeking to pilfer i ... Show More
31m 54s
Feb 2021
The War with Algorithms: Why Your Next Security Strategy Includes A.I. and Machine Learning
<p>The image of a hooded individual illuminated by the glare of a computer screen hacking into a company’s network is the classic picture of what a cyber attack looks like. The reality, though, is these attackers are almost never a one-man band, but rather a sophisticated team ar ... Show More
40m 57s
Mar 2021
Wed. 03/10 – Now The Hackers Are In The Security Cams
Hackers breached the security cameras used by everybody from prisons and hospitals to Tesla factories. Why you will no longer “subscribe” to this podcast, but will “follow” it. Why T-Mobile is signing everyone up to have their usage data tracked by advertisers. And Facebook’s 10 ... Show More
18m 5s
Sep 2023
Tech News: Hackers Gotta Hack
Chinese-backed hackers are infiltrating computer systems by compromising routers. Some security researchers say that modern GPUs can steal pixels right off a web site. And Microsoft encounters yet more resistance regarding its acquisition of Activision Blizzard.See omnystudio.com ... Show More
20m 25s