logo
episode-header-image
Jan 2024
29m 14s

Casting a wider hiring net.

N2K Networks
About this episode
The Feds look to cast a wider hiring net. Legislators focus on deepfakes. Cookie stealers bypass MFA on Google accounts. A Fast food hiring chat bot got hacked. Medusa casts her gaze toward extortion. Akira ransomware is active in Finland. GitLab patches critical vulnerabilities. Bosch thermostats are vulnerable to some hot firmware. CSAM vendors’ crypto sop ... Show More
Up next
Today
Startup surge sparks spy interest. [Research Saturday]
This week, we are joined by Santiago Pontiroli, Threat Intelligence Research Lead from Acronis TRU team, discussing their work on "New year, new sector: Transparent Tribe targets India’s startup ecosystem." The Acronis Threat Research Unit uncovered a new campaign by Transparent ... Show More
19m 15s
Yesterday
War comes for the cloud.
Cloud data centers come under fire in wartime. A massive dark web intelligence database is exposed. Chinese hackers exploit a video conferencing zero-day. The intelligence community rolls out cyber modernization plans. React2Shell attacks spread at scale. Iowa sues UnitedHealth o ... Show More
30m 53s
Apr 2
The WhatsApp impostor.
A fake WhatsApp spreads spyware. The State Department pushes embassies to counter influence ops. Cisco patches critical bugs. CrystalRAT hits Telegram. A Texas hospital breach affects 250,000. HHS reshuffles IT oversight. China-linked spies target Europe. EvilTokens hijacks Micro ... Show More
30 m
Recommended Episodes
May 2020
The Dark Secrets of a Hacking Hero
<p>In May of 2017, Marcus Hutchins saved the internet. A vicious ransomware attack known as WannaCry had infected computer systems across dozens of countries. It was the worst cyberattack in history at the time, and it seemed unstoppable. But Hutchins, a 23-year-old-hacker in Ilf ... Show More
30m 39s
Sep 2022
How To Protect Yourself From Social Engineering Hacks
Hacks are increasing but the hackers are not necessarily getting more sophisticated. What do Twitter, Twilio, and Uber all have in common? They were all hacked by, in part, a conversation. In all three cases, the hack was helped along by social engineering. Someone contacted an e ... Show More
29m 32s
Jul 2021
Analyzing the Impact of A.I. and Technology on Society and Cybersecurity
<p>Technology is advancing at pace never seen before and the newest tech, applications and widgets are being widely adopted at an even quicker rate. </p><p>Just look at A.I. and machine learning tools,which are now used to identify things once thought unimaginable — whether it's ... Show More
49m 58s
Jan 2021
Living on the Edge: How Netskope is Redefining Edge Security
<p>When Netskope CEO and founder <a href="https://www.linkedin.com/in/sanjayberi/">Sanjay Beri </a>left his role with well-known Juniper Networks, he knew the internet and the way that we protected ourselves virtually was changing. The issue is that while Sanjay knew companies ne ... Show More
45m 49s
Feb 2021
Nicole Perlroth, "This Is How They Tell Me the World Ends: The Cyberweapons Arms Race" (Bloomsbury, 2021)
For years, cybersecurity experts have debated whether cyber-weapons represent a destabilizing new military technology or merely the newest tool in the spies’ arsenal. In This Is How They Tell Me the World Ends (Bloomsbury, 2021), Nicole Perlroth makes a compelling case that cyber ... Show More
58m 4s
Mar 2022
The Rise of the Hacking Group LAPSUS$
It started with SIM swapping and escalated into hacks of Okta, Microsoft, Nvidia, and EA. They’re LAPSUS$, a hacking collective that’s been the boogeyman of big corporations for the past few years. People have wondered about their motivations and identities.Now, seven of them hav ... Show More
33m 17s