logo
episode-header-image
Oct 2024
7m 13s

fast flux (noun)

N2K Networks
About this episode

Please enjoy this encore of Word Notes.

A network designed to obfuscate the location of a cyber adversary's command and control server by manipulating the domain name system, or DNS, in a way that rotates the associated IP address among large numbers of compromised hosts in a botnet.

Learn more about your ad choices. Visit megaphone.fm/adchoices

Up next
Yesterday
adversary group naming (noun)
Please enjoy this encore of Word Notes. A cyber threat intelligence best practice of assigning arbitrary labels to collections of hacker activity across the intrusion kill chain. Learn more about your ad choices. Visit megaphone.fm/adchoices 
10m 17s
Jul 1
BSIMM (noun)
Please enjoy this encore of Word Notes. A descriptive model that provides a baseline of observed software security initiatives and activities from a collection of volunteer software development shops. CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/bsimm⁠ Audio refere ... Show More
6m 9s
Jun 24
OWASP vulnerable and outdated components (noun)
Please enjoy this encore of Word Notes. Software libraries, frameworks, packages, and other components, and their dependencies (third-party code that each component uses) that have inherent security weaknesses, either through newly discovered vulnerabilities or because newer vers ... Show More
8m 4s
Recommended Episodes
Feb 2017
The Martin NSA-contractor case. Fileless malware hits banks worldwide. DDoS tools undergo refinement. Ransomware developments. Industry notes.
In today's podcast we review some updates on the Martin NSA-contractor case. Fileless malware hits banks worldwide. DDoS tools undergo refinement. Researchers take a look at ransomware developments. It's been an active week for the cyber sector in mergers, acquisitions, and ventu ... Show More
16m 33s
Apr 2023
The Power of Graph Neural Networks: Understanding the Future of AI - Part 1/2 (Ep.223)
In this episode, I explore the cutting-edge technology of graph neural networks (GNNs) and how they are revolutionizing the field of artificial intelligence. I break down the complex concepts behind GNNs and explain how they work by modeling the relationships between data points ... Show More
27m 40s
Aug 2017
[MINI] Recurrent Neural Networks
RNNs are a class of deep learning models designed to capture sequential behavior.  An RNN trains a set of weights which depend not just on new input but also on the previous state of the neural network.  This directed cycle allows the training phase to find solutions which rely o ... Show More
17m 6s
Sep 2023
Malicious ads in a chatbot. A vulnerability gets some clarification. Cl0p switches from Tor to torrents. Influence operations as an adjunct to WMD. And NSA’s new AI Security Center.
Malicious ads in a chatbot. Google provides clarification on a recent vulnerability. Cl0p switches from Tor to torrents. Influence operations as an adjunct to weapons of mass destruction. Our guest Jeffrey Wells, former Maryland cyber czar and partner at Sigma7 shares his thought ... Show More
26m 46s
Apr 2013
The Cloudcast (.net) #82 - SDN, Big Data, Internet of Things and What's Next?
Amy Lewis (@CommsNinja) talks with Lew Tucker (@lewtucker, SVP/CTO @ Cisco) and Dave McCrory (@mccrory, SVP @ Warner Music) about the latest keynotes at CloudConnect, the intersection between SDN / Big Data / Sensor Data, and how Cloud Computing and Networking are evolving as a r ... Show More
32m 40s
Sep 2023
DPRK cyberespionage update. New cybercriminal TTPs. The state of DevSecOps. Hacktivism and the nation-state. Cyberwar lessons learned. A free decryptor for Key Group ransomware.
A VMConnect supply chain attack is connected to the DPRK. Reports of an aledgedly "fully undetectable information stealer." DB#JAMMER brute forces exposed MSSQL databases. A Cyberattack on a Canadian utility. The state of DevSecOps. A look at hacktivism, today and beyond. Betsy C ... Show More
31m 33s
May 2024
AI Is a Cybersecurity Tool and Threat
When it comes to cybersecurity, artificial intelligence is proving to be both a formidable defensive tool and a potential threat. Today, Patrick Hevesi, VP Analyst with Gartner for Technical Professionals, discusses the concept and implications of “dark AI.” He also highlights pr ... Show More
26m 19s