logo
episode-header-image
Feb 2025
25m 19s

Pay the ransom or risk data carnage.

N2K Networks
About this episode
Qilin ransomware gang claims responsibility for attack against Lee Enterprises. Thai police arrest suspected hacker behind more than 90 data leaks. JavaGhost uses compromised AWS environments to launch phishing campaigns. LotusBlossum cyberespionage campaigns target Southeast Asia. Malware abuses Microsoft dev tunnels for C2 communication. Protecting the foo ... Show More
Up next
Yesterday
A wake-up call on frontier AI.
OpenAI and Anthropic brief Congress on cyber-capable AI. The GAO flags improper DOGE access to Treasury payment systems. Greece moves to end online anonymity. CISA orders agencies to patch an exploited Windows zero-day. Researchers uncover ransomware that destroys data instead of ... Show More
28m 36s
Apr 28
War hits where it hurts.
Conflict in the Middle East disrupts the circuit board supply chain. The Supreme Court considers arguments on geofence searches. A new report highlights Chinese digital transnational repression. The NCSC protects HDMI and DisplayPort links. Tennessee bans cryptocurrency ATMs. Res ... Show More
24m 57s
Apr 28
The Three-Layer Strategy for Autonomous Agent Governance with Joe Hladik [Data Security Decoded] and Amit Malik
The race for AI dominance has created a dangerous imbalance between business velocity and cyber resilience. In this episode, host Caleb Tolin is joined by Joe Hladik, Head of Rubrik Zero Labs, and Staff Security Researcher Amit Malik to break down the findings of their latest rep ... Show More
1m 30s
Recommended Episodes
Feb 2025
10,000 Days in Cybersecurity
Cybersecurity has changed dramatically over the past 10,000 days. In this episode of Threat Vector, host David Moulton speaks with Haider Pasha, Chief Security Officer for EMEA & LATAM at Palo Alto Networks, about how the field has evolved and what’s coming next. From his early e ... Show More
36m 19s
Oct 2025
The $25M Zoom Call: How Deepfakes Are Rewriting the Rules of Trust, Featuring KnowBe4's Erich Kron
<p>A Hong Kong employee sits through what seems like a routine video call with colleagues and the CFO. Everything looks normal. Then comes the urgent wire transfer request. $25 million later, the horrifying truth emerges: every face on that call was fake, generated by AI.</p> <p> ... Show More
38m 18s
Jun 2025
Managing online security throughout the decades.
tail spinning
43m 9s
Feb 2025
DeepSeek: An AI triumph? Or a dicey security risk?
<p>Last month, no one had heard of DeepSeek. But then it racked up a stunning 16 million downloads in just 18 days — nearly double ChatGPT’s initial adoption. </p> <p>  </p> <p>The China-based AI model has certainly captured the attention of both investors and technologists. But ... Show More
30m 42s
May 2024
Critical infrastructure: Pending legislation and risks and rewards from AI.
Mandiant ties OT attacks to Sandworm. Russia-linked hackers target Texas water utilities. Belarusian hacktivists hit fertilizer company. CISA issues eight ICS advisories. Dave Bittner's Caveat podcast co host Ben Yelin joins him to discuss pending legislation with potential to af ... Show More
24m 20s