logo
episode-header-image
Dec 2024
31m 20s

Buckets of trouble.

N2K Networks
About this episode
Researchers uncover a large-scale hacking operation tied to the infamous ShinyHunters. A Dell Power Manager vulnerability lets attackers execute malicious code. TikTok requests a federal court injunction to delay a U.S. ban. Radiant Capital attributed a $50 million cryptocurrency heist to North Korea. Japanese firms report ransomware attacks affecting their ... Show More
Up next
Today
Mike Arrowsmith: Facing adversity in the workplace. [CTrO] [Career Notes]
Please enjoy this encore of Career Notes. Mike Arrowsmith, Chief Trust Officer at NinjaOne, leads the organization’s IT, security, and support infrastructure to ensure they meet customers’ security and data privacy demands as it scales. Mike discusses how his career path has led ... Show More
7m 51s
Yesterday
Stealer in the status bar. [Research Saturday]
Today we have Ziv Mador, VP of Security Research from LevelBlue SpiderLabs discussing their work on "SpiderLabs IDs New Banking Trojan Distributed Through WhatsApp." Researchers at LevelBlue SpiderLabs have identified a new Brazilian banking Trojan dubbed Eternidade Stealer, spre ... Show More
15m 34s
Feb 13
Total defense meets total threat.
Global leaders call for collaboration at the Munich Cyber Security Conference. Phishing campaigns exploit fake video conference invitations. Italian authorities say cyber attacks on the Winter Olympics have met overall mitigation. AI reshapes the economics of ransomware attacks. ... Show More
27m 36s
Recommended Episodes
Sep 2025
Cloudflare Fends Off A Record Breaking 11.5 Tbps DDoS Attack
In this episode of Cybersecurity Today, host Jim Love covers the latest and most critical stories in the world of cyber threats and digital defense: • Cloudflare fends off a record-breaking 11.5 Tbps DDoS attack, highlighting the relentless scale and sophistication of modern cybe ... Show More
11m 59s
Sep 2025
Hackers Say Thanks For Lousy Security In Large Fast Food Chain
Cybersecurity Today: Ghost Action Campaign, SalesLoft Breach, AI Vulnerabilities, and Restaurant Security Flaws Host David Shipley discusses the latest in cybersecurity, including the Ghost Action Campaign which compromised over 3000 secrets from GitHub repositories, the SalesLof ... Show More
12m 7s
Sep 2025
Lockbit Is Back
Emerging Cybersecurity Threats: Lockbit 5.0, Salesforce AI Vulnerabilities, and China's Cyber Intelligence Advancements In this episode of 'Cybersecurity Today,' host Jim Love discusses the latest cybersecurity threats, including the emergence of Lockbit 5.0 ransomware which can ... Show More
9m 30s
Feb 2025
10,000 Days in Cybersecurity
Cybersecurity has changed dramatically over the past 10,000 days. In this episode of Threat Vector, host David Moulton speaks with Haider Pasha, Chief Security Officer for EMEA & LATAM at Palo Alto Networks, about how the field has evolved and what’s coming next. From his early e ... Show More
36m 19s
Nov 8
A Former Black Hat Hacker Advises Us On Security Weaknesses
Unveiling the Double-Edged Sword of AI in Cybersecurity with Brian Black In this episode of Cybersecurity Today, host Jim Love interviews Brian Black, the head of security engineering at Deep Instinct and a former black hat hacker. Brian shares his journey into hacking from a you ... Show More
55m 44s
Oct 2025
The $25M Zoom Call: How Deepfakes Are Rewriting the Rules of Trust, Featuring KnowBe4's Erich Kron
<p>A Hong Kong employee sits through what seems like a routine video call with colleagues and the CFO. Everything looks normal. Then comes the urgent wire transfer request. $25 million later, the horrifying truth emerges: every face on that call was fake, generated by AI.</p> <p> ... Show More
38m 18s
Feb 2025
DeepSeek: An AI triumph? Or a dicey security risk?
<p>Last month, no one had heard of DeepSeek. But then it racked up a stunning 16 million downloads in just 18 days — nearly double ChatGPT’s initial adoption. </p> <p>  </p> <p>The China-based AI model has certainly captured the attention of both investors and technologists. But ... Show More
30m 42s