Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
A fun and informative cybersecurity audio glossary from N2K.
…
continue reading
Step inside the diverse and fascinating worlds of cybersecurity professionals around the globe and hear their personal stories in their own words.
…
continue reading
Every Saturday, we sit down with cybersecurity researchers to talk shop about the latest threats, vulnerabilities, and technical discoveries.
…
continue reading
Encore seasons of the popular CyberWire Pro podcast hosted by Chief Analyst, Rick Howard. Join Rick and the Hash Table experts as they discuss the ideas, strategies and technologies that senior cybersecurity executives wrestle with on a daily basis. For the latest seasons ad-free along with essays, transcripts, and bonus content, sign up for CyberWire Pro.
…
continue reading
Get ready for a deep dive into what cybersecurity professionals often refer to as the "8th Layer" of security: HUMANS. Welcome to 8th Layer Insights (8Li). This podcast is a multidisciplinary exploration into how the complexities of human nature affect security and risk. Author, security researcher, and behavior science enthusiast Perry Carpenter taps experts for their insights and illumination. Topics include cybersecurity, psychology, behavior science, communication, leadership, and more.
…
continue reading
Control Loop is the OT Cybersecurity Podcast, your terminal for ICS security, intelligence, and learning. Every two weeks, we bring you the latest news, strategies, and technologies that industry professionals rely on to safeguard civilization.
…
continue reading
Flash cybersecurity advisories from the US Government. These alerts provide timely technical and operational information, indicators of compromise, and mitigations for current major security threats, vulnerabilities, and exploits. These alerts have been edited and adapted for audio by N2K Networks as a public service.
…
continue reading
An occasional series from the team at the Hacking Humans podcast. N2K's Dave Bittner and co-host from the Johns Hopkins University Information Security Institute, Joe Carrigan, are joined by the N2K's Chief Security Officer and Chief analyst, Rick Howard. The team watches clips from some of their favorite movies, clips which demonstrate examples of the social engineering scams and schemes they talk about on Hacking Humans.
…
continue reading
The daily space intelligence and analysis that global space industry leaders and experts depend on. Published each weekday, this program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world. Visit us to learn more at https://space.n2k.com/
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CrowdStrike and Microsoft battle blue screens across the globe.
40:25
40:25
Play later
Play later
Lists
Like
Liked
40:25
Mitigation continues on the global CrowdStrike outage. UK police arrest a suspected member of Scattered Spider. A scathing report from DHS says CISA ignored a directive to cut ties with a faulty contractor. Huntress finds SocGholish distributing AsyncRAT. Ransomware takes down the largest trial court in the U.S. A US regulator finds many major bank…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
2024 Cyber Talent Study by N2K and WiCyS. [N2K CyberWIre Special Edition]
43:50
43:50
Play later
Play later
Lists
Like
Liked
43:50
Maria Varmazis, N2K host of T-Minus Space Daily, talks with WiCyS Executive Director Lynn Dohm and N2K's Simone Petrella, Dr. Heather Monthie, and Jeff Welgan about the 2024 Cyber Talent Study. N2K and WiCyS have come together under a common mission to attract, retain, and advance more women in cybersecurity. Together, we strive to support women th…
…
continue reading
An acronym for Advanced Persistent Threat to describe hacker groups or campaigns normally, but not always, associated with nation state cyber espionage and continuous low-level cyber conflict operations.By N2K Networks
…
continue reading
An acronym for Advanced Persistent Threat to describe hacker groups or campaigns normally, but not always, associated with nation state cyber espionage and continuous low-level cyber conflict operations. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy N2K Networks
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The UK invests in future space innovation.
30:49
30:49
Play later
Play later
Lists
Like
Liked
30:49
The UK Space Agency has announced a £33 million boost for national space programs. The European Space Agency’s Space Debris Office has published its annual Space Environment Report. The French space agency CNES and Bpifrance have selected a Thales Alenia Space-led consortium, along with Magellium Artal Group, to demonstrate an in-orbit capture and …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The current state of Cyber Threat Intelligence. [CSOP]
17:31
17:31
Play later
Play later
Lists
Like
Liked
17:31
Rick Howard, The CSO, Chief Analyst, and Senior Fellow at N2K Cyber, discusses the current state of Cyber Threat Intelligence with CyberWire Hash Table guest John Hultquist, Mandiant’s Chief Analyst. References: Andy Greenberg, 2022. Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency [Book]. Goodreads. Josephine Wolff, Octob…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The current state of Cyber Threat Intelligence.
17:31
17:31
Play later
Play later
Lists
Like
Liked
17:31
Rick Howard, The CSO, Chief Analyst, and Senior Fellow at N2K Cyber, discusses the current state of Cyber Threat Intelligence with CyberWire Hash Table guest John Hultquist, Mandiant’s Chief Analyst. References: Andy Greenberg, 2022. Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency [Book]. Goodreads. Josephine Wolff, Octob…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Encore: James Hadley: Spend time on what interests you. [CEO] [Career Notes]
7:04
7:04
Play later
Play later
Lists
Like
Liked
7:04
Founder and CEO of Immersive Labs James Hadley takes us through his career path from university to cybersecurity startup. James tells us about his first computer and how he liked to push it to its limits and then some. He joined GCHQ after college and consulted across government departments. Teaching in GCHQ's cyber summer school was where James fe…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Encore: James Hadley: Spend time on what interests you. [CEO]
7:04
7:04
Play later
Play later
Lists
Like
Liked
7:04
Founder and CEO of Immersive Labs James Hadley takes us through his career path from university to cybersecurity startup. James tells us about his first computer and how he liked to push it to its limits and then some. He joined GCHQ after college and consulted across government departments. Teaching in GCHQ's cyber summer school was where James fe…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Olympic scammers go for gold. [Research Saturday]
23:30
23:30
Play later
Play later
Lists
Like
Liked
23:30
This week, we are joined by Selena Larson, Staff Threat Researcher, Lead Intelligence Analysis and Strategy at Proofpoint, as well as host of the "Only Malware in the Building" podcast, as she is discussing their research on "Scammers Create Fraudulent Olympics Ticketing Websites." Proofpoint recently identified a fraudulent website selling fake ti…
…
continue reading
Our guest today is Amanda Lee Falkenberg, composer of THE MOONS SYMPHONY. The symphony presents an unparalleled fusion of visuals and music, celebrating the convergence of music and science to vividly portray past, present, and future lunar explorations. The music Incorporates the perspectives of astronauts into a musical voyage through our galaxy.…
…
continue reading
This week, we are joined by Selena Larson, Staff Threat Researcher, Lead Intelligence Analysis and Strategy at Proofpoint, as well as host of the "Only Malware in the Building" podcast, as she is discussing their research on "Scammers Create Fraudulent Olympics Ticketing Websites." Proofpoint recently identified a fraudulent website selling fake ti…
…
continue reading
The National Security Space Association's independent think tank, The Moorman Center for Space Studies, has released a report called "America's Asymmetric Vulnerability to Navigation Warfare: Leadership and Strategic Direction Needed to Mitigate Significant Threats." Intuitive Machines has finalized the IM-2 mission landing region ahead of its sold…
…
continue reading
A Crowdstrike update takes down IT systems worldwide. A U.S. District Court judge dismissed most charges against SolarWinds. Sophos examines the ransomware threat to the energy sector. European web hosting companies suspend Doppelgänger propaganda. An Australian digital prescription services provider confirms a ransomware attack affecting nearly 13…
…
continue reading
Cisco has identified a critical security flaw in its SSM On-prem. The world's largest recreational boat and yacht retailer reports a data breach. The UK’s NHS warns of critically low blood stocks after a ransomware attack. Port Shadow enables VPN person in the middle attacks. Ivanti patches several high-severity vulnerabilities. FIN7 is advertising…
…
continue reading
NASA has announced its intent to discontinue development of its VIPER project. Firefly Aerospace’s Board of Directors have announced that Bill Weber is no longer serving as CEO of the company, effective immediately. Astra Space has announced the successful closing of its take-private transaction, and more. Remember to leave us a 5-star rating and r…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Welcome to a new age in digital deception.
37:37
37:37
Play later
Play later
Lists
Like
Liked
37:37
This week, Maria Varmazis host of the N2K daily space show, T-Minus, joins Dave and Joe, as they celebrate Maria joining the Hacking Humans podcast every week! Maria's story is on supplement scams, as there has been a significant surge in health-related supplement scams on social media platforms, utilizing advanced technologies like AI-generated im…
…
continue reading
SpaceX has announced that the company will be moving its headquarters from California to Texas. The US and the Kingdom of Saudi Arabia have signed a strategic cooperation agreement on civil space research and exploration. LeoLabs has been selected to support the launch and operations of the UK Space Command's Project Tyche by delivering space track…
…
continue reading
Interpol pursues West African cybercrime groups. Bassett Furniture shuts down manufacturing following a ransomware attack. A gastroenterologist group notifies patients of a data breach. An Apache HugeGraph flaw is being actively exploited. Octo Tempest updates its toolkit. Satori uncovers evil twin campaigns on Google Play. The cost of the Change H…
…
continue reading
The European Space Agency (ESA) has started preparatory work for its next planetary defense mission called the Rapid Apophis Mission for Space Safety (Ramses). US Space Systems Command (SSC) has rolled out its new automated Consolidated Operational Data Archive system (CODA). KBR has entered into a definitive agreement to acquire LinQuest Corporati…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Squarespace's square off with hijacked domains.
36:53
36:53
Play later
Play later
Lists
Like
Liked
36:53
Some Squarespace users see their domains hijacked. Kaspersky Lab is shutting down US operations. BackPack APKs break malware analysis tools. Hackers use 7zip files to deliver Poco RAT malware. CISA’s red-teaming reveals security failings at an unnamed federal agency. Microsoft fixes an Outlook bug triggering false security alerts. Switzerland manda…
…
continue reading
An undocumented or publicly unknown method to access a computer system undetected or to break a cypher used to encode messages.By N2K Networks
…
continue reading
An undocumented or publicly unknown method to access a computer system undetected or to break a cypher used to encode messages. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy N2K Networks
…
continue reading
Spanish launcher company PLD Space has signed a €31.2 million euros syndicated loan with Banco Santander, EBN Banco and the Instituto de Crédito Oficial. European aerospace groups Airbus and Thales are reportedly exploring a tie-up of some space activities as new competition disrupts the sector. NASA launched a large stratospheric balloon from Esra…
…
continue reading
The assassination attempt on former President Trump sparks online disinformation. AT&T pays to have stolen data deleted. Rite Aid recovers from ransomware. A hacktivist group claims to have breached Disney’s Slack. Checkmarx researchers uncover Python packages exfiltrating user data. HardBit ransomware gets upgraded with enhanced obfuscation. Threa…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The current state of MITRE ATT&CK. [CSOP]
18:37
18:37
Play later
Play later
Lists
Like
Liked
18:37
Rick Howard, The CSO, Chief Analyst, and Senior Fellow at N2K Cyber, discusses the current state of MITRE ATT&CK with CyberWire Hash Table guests Frank Duff, Tidal Cyber’s Chief Innovation Officer, Amy Robertson, MITRE Threat Intelligence Engineer and ATT&CK Engagement lead, and Rick Doten, Centene’s VP of Information Security. References: Amy L. R…
…
continue reading
Rick Howard, The CSO, Chief Analyst, and Senior Fellow at N2K Cyber, discusses the current state of MITRE ATT&CK with CyberWire Hash Table guests Frank Duff, Tidal Cyber’s Chief Innovation Officer, Amy Robertson, MITRE Threat Intelligence Engineer and ATT&CK Engagement lead, and Rick Doten, Centene’s VP of Information Security. References: Amy L. R…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Encore: Malek Ben Salem: Taking those challenges. [R&D]
6:21
6:21
Play later
Play later
Lists
Like
Liked
6:21
Americas Security R&D Lead for Accenture Malek Ben Salem shares how she pivoted from her love of math and background in electrical engineering to a career in cybersecurity R&D. Malek talks about her interest in astrophysics as a young girl, and how her affinity for math and taking on challenges lead her to a degree in electrical engineering. She gr…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Encore: Malek Ben Salem: Taking those challenges. [R&D] [Career Notes]
6:21
6:21
Play later
Play later
Lists
Like
Liked
6:21
Americas Security R&D Lead for Accenture Malek Ben Salem shares how she pivoted from her love of math and background in electrical engineering to a career in cybersecurity R&D. Malek talks about her interest in astrophysics as a young girl, and how her affinity for math and taking on challenges lead her to a degree in electrical engineering. She gr…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
On the prowl for mobile malware. [Research Saturday]
27:18
27:18
Play later
Play later
Lists
Like
Liked
27:18
This week, we are joined by Asheer Malhotra and Vitor Ventura from Cisco Talos, and they are discussing "Operation Celestial Force employs mobile and desktop malware to target Indian entities." Cisco Talos revealed Operation Celestial Force, an espionage campaign by the Pakistani threat group "Cosmic Leopard," targeting Indian defense, government, …
…
continue reading