The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
1
Crypto client or cyber trap? [Research Saturday]
24:02
24:02
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
24:02
Karlo Zanki, Reverse Engineer at ReversingLabs, discussing their work on "Malicious PyPI crypto pay package aiocpa implants infostealer code." ReversingLabs' machine learning-based threat hunting system identified a malicious PyPI package, aiocpa, designed to exfiltrate cryptocurrency wallet information. Unlike typical attacks involving typosquatti…
…
continue reading
The U.S. sanctions Russian and Iranian groups over election misinformation. Apple settles a class action lawsuit over Siri privacy allegations. DoubleClickjacking exploits a timing vulnerability in browser behavior. FireScam targets sensitive info on Android devices. ASUS issues a critical security advisory for several router models. A former crypt…
…
continue reading
1
Dominique West: Security found me. [Strategy] [Career Notes]
7:53
7:53
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
7:53
Technical account manager Dominique West takes us on her career journey from engineering to cybersecurity. Even though her undergraduate degree was in information systems, Dominique did not learn about cybersecurity until she personally experienced credit card fraud. She had a range of positions from working the help desk in an art museum to vulner…
…
continue reading
Chinese hackers breach the U.S. Treasury Department. At least 35 Chrome extensions are compromised. Federal authorities arrest a U.S. Army soldier over accusations of sensitive data stolen from AT&T and Verizon. A misconfigured Amazon cloud server exposes sensitive data from over 800,000 VW EV owners. Rhode Island confirms a data breach linked to r…
…
continue reading
1
Scotland’s position to lead cyber and space. [Deep Space]
30:24
30:24
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
30:24
Sharon Lemac-Vincere is an academic that focuses her research on the intersection of space and cyber. She has released a report on space and cybersecurity which outlines how Scotland can lead the way in both industries. You can connect with Sharon on LinkedIn, and read her paper on The Cyber-Safe Gateway : Unlocking Scotland's Space Cybersecurity P…
…
continue reading
1
Disrupting Cracked Cobalt Strike [The Microsoft Threat Intelligence Podcast]
38:40
38:40
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
38:40
While we are on our winter publishing break, please enjoy an episode of our N2K CyberWire network show, The Microsoft Threat Intelligence Podcast by Microsoft Threat Intelligence. See you in 2025! On this week's episode of The Microsoft Threat Intelligence Podcast, we discuss the collaborative effort between Microsoft and Fortra to combat the illeg…
…
continue reading
1
Future-proofing finance: FS-ISAC’s blueprint for cryptographic agility. [Special Edition]
24:06
24:06
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
24:06
Brandon Karpf sits down with Mike Silverman, Chief Strategy and Innovation Officer at FS-ISAC, to discuss the white paper Building Cryptographic Agility in the Financial Sector. Authored by experts from FS-ISAC’s Post-Quantum Cryptography Working Group, the paper addresses the vulnerabilities posed by quantum computing to current cryptographic algo…
…
continue reading
1
Navigating AI Safety and Security Challenges with Yonatan Zunger [The BlueHat Podcast]
53:34
53:34
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
53:34
While we are on our winter publishing break, please enjoy an episode of our N2K CyberWire network show, The BlueHat Podcast by Microsoft and MSRC. See you in 2025! Yonatan Zunger, CVP of AI Safety & Security at Microsoft joins Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. Yonatan explains the distinction between gen…
…
continue reading
1
Streamlining the US Navy's innovation process: A conversation with Acting CTO Justin Fanelli.
39:50
39:50
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
39:50
Please enjoy this encore episode of a Special Edition. N2K’s Brandon Karpf speaks with guest Justin Fanelli, Acting CTO of the US Navy, about the US Navy streamlining the innovation process. For some background, you can refer to this article. Additional resources: PEO Digital Innovation Adoption Kit Atlantic Council’s Commission on Defense Innovati…
…
continue reading
1
Yatia (Tia) Hopkins: Grit and right place, right time. [Solutions Architecture] [Career Notes]
8:14
8:14
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
8:14
VP of Global Solutions Architecture at eSentire Tia Hopkins shares her career journey and talks about its beginnings in engineering and pivots into cybersecurity leadership. Tia shares how she liked to take things apart when she was young, including the brand new computer her mother bought her and how she was fascinated by all the pieces of it spre…
…
continue reading
1
On the prowl for mobile malware. [Research Saturday]
27:18
27:18
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
27:18
This week, we are joined by Asheer Malhotra and Vitor Ventura from Cisco Talos, and they are discussing "Operation Celestial Force employs mobile and desktop malware to target Indian entities." Cisco Talos revealed Operation Celestial Force, an espionage campaign by the Pakistani threat group "Cosmic Leopard," targeting Indian defense, government, …
…
continue reading
Please enjoy this encore episode of Only Malware in the Building. Welcome in! You’ve entered, Only Malware in the Building. Grab your eggnog and don your coziest holiday sweater as we sleuth our way through cyber mysteries with a festive twist! Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired…
…
continue reading
1
Putting a dent in the cybersecurity workforce gap.
31:03
31:03
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
31:03
Please enjoy this encore episode of Solution Spotlight. In this special edition of Solution Spotlight, N2K President, Simone Petrella is talking with ISC2 CEO Clar Rosso about putting a dent in the cybersecurity workforce gap through empowerment, breaking down barriers and expanding DE&I initiatives. Learn more about your ad choices. Visit megaphon…
…
continue reading