Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
A fun and informative cybersecurity audio glossary from the CyberWire.
…
continue reading
Step inside the diverse and fascinating worlds of cybersecurity professionals around the globe and hear their personal stories in their own words.
…
continue reading
Every Saturday, we sit down with cybersecurity researchers to talk shop about the latest threats, vulnerabilities, and technical discoveries.
…
continue reading
C
Control Loop: The OT Cybersecurity Podcast


1
Control Loop: The OT Cybersecurity Podcast
N2K Networks
Control Loop is the OT Cybersecurity Podcast, your terminal for ICS security, intelligence, and learning. Every two weeks, we bring you the latest news, strategies, and technologies that industry professionals rely on to safeguard civilization.
…
continue reading
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading
Encore seasons of the popular CyberWire Pro podcast hosted by Chief Analyst, Rick Howard. Join Rick and the Hash Table experts as they discuss the ideas, strategies and technologies that senior cybersecurity executives wrestle with on a daily basis. For the latest seasons ad-free along with essays, transcripts, and bonus content, sign up for CyberWire Pro.
…
continue reading
Get ready for a deep dive into what cybersecurity professionals often refer to as the "8th Layer" of security: HUMANS. Welcome to 8th Layer Insights (8Li). This podcast is a multidisciplinary exploration into how the complexities of human nature affect security and risk. Author, security researcher, and behavior science enthusiast Perry Carpenter taps experts for their insights and illumination. Topics include cybersecurity, psychology, behavior science, communication, leadership, and more.
…
continue reading
An occasional series from the team at the Hacking Humans podcast. The CyberWire's Dave Bittner and co-host from the Johns Hopkins University Information Security Institute, Joe Carrigan, are joined by the Cyberwire’s Chief Security Officer and Chief analyst, Rick Howard. The team watches clips from some of their favorite movies, clips which demonstrate examples of the social engineering scams and schemes they talk about on Hacking Humans.
…
continue reading
Flash cybersecurity advisories from the US Government. These alerts provide timely technical and operational information, indicators of compromise, and mitigations for current major security threats, vulnerabilities, and exploits. These alerts have been edited and adapted for audio by The CyberWire as a public service.
…
continue reading
C
CyberWire Daily


1
Sleeper malware denied at Sellafield nuclear site.
23:16
23:16
Play later
Play later
Lists
Like
Liked
23:16
The UK Government's denial of a cyber incident at Sellafield. There’s been a surge in Iranian cyberattacks on US infrastructure. Misuse of Apple's lockdown mode, the mysterious AeroBlade's activities in aerospace, and a clever "Disney+" scam. Plus The latest application security trends, and a new cybersecurity futures study. In our Industry Voices …
…
continue reading
A mathematical method by which one party (the prover) can prove to another party (the verifier) that something is true, without revealing any information apart from the fact that this specific statement is true. CyberWire Glossary link: https://thecyberwire.com/glossary/zero-knowledge-proof Audio reference link: Staff, 2022. Zero Knowledge Proofs […
…
continue reading
The US and Israel attribute attacks on PLCs to Iran. Agent Raccoon backdoors organizations on three continents. XDSpy is reported to be phishing the Russian defense sector. Trends in digital banking fraud. Repojacking Go module repositories. Ann Johnson from Afternoon Cyber Tea speaks with Lynn Dohm, executive director of WiCyS, about the power of …
…
continue reading
C
CyberWire Daily


1
Bernard Brantley: Tomorrow is a new day. [CISO] [Career Notes]
10:33
10:33
Play later
Play later
Lists
Like
Liked
10:33
Bernard Brantley, CISO from Corelight sits down to share his inspiring career path with others. Bernard started at the very bottom of the tech stack, and shares how he was extremely unclear about what it was that he wanted to do in life and how he was going to get there. Ultimately he reached a point now where he has the self confidence and an incr…
…
continue reading
C
Career Notes


1
Bernard Brantley: Tomorrow is a new day. [CISO]
10:33
10:33
Play later
Play later
Lists
Like
Liked
10:33
Bernard Brantley, CISO from Corelight sits down to share his inspiring career path with others. Bernard started at the very bottom of the tech stack, and shares how he was extremely unclear about what it was that he wanted to do in life and how he was going to get there. Ultimately he reached a point now where he has the self confidence and an incr…
…
continue reading
C
CyberWire Daily


1
Exploits and vulnerabilities. [Research Saturday]
18:48
18:48
Play later
Play later
Lists
Like
Liked
18:48
Ryan from Bishop Fox joins to describe their work on "Building an Exploit for FortiGate Vulnerability CVE-2023-27997." After Lexfo published details of a pre-authentication remote code injection vulnerability in the Fortinet SSL VPN, Bishop Fox worked up a proof of concept demo. This research share how they were able to create that proof-of-concept…
…
continue reading
Ryan from Bishop Fox joins to describe their work on "Building an Exploit for FortiGate Vulnerability CVE-2023-27997." After Lexfo published details of a pre-authentication remote code injection vulnerability in the Fortinet SSL VPN, Bishop Fox worked up a proof of concept demo. This research share how they were able to create that proof-of-concept…
…
continue reading
Senator Wyden blocks the Senate vote on the new NSA and Cyber Command lead. GPS interference is attributed to Iran. Meta identifies and removes Chinese and Russian accounts and groups for coordinated inauthenticity. The EU Council president proposes ‘European cyber force’ with ‘offensive capabilities’. Twisted Spider is observed conducting new rans…
…
continue reading
C
CyberWire Daily


1
Widespread exploitation of severe vulnerability in ownCloud.
26:51
26:51
Play later
Play later
Lists
Like
Liked
26:51
Reports of a Critical Vulnerability in ownCloud. Sites serving bogus McAfee virus alerts. Japan’s space agency reports a breach. Okta revises the impact of their recent breach. Cryptomixer gets taken down in an international law enforcement operation. "SugarGh0st" RAT prospects targets in Uzbekistan and South Korea. NATO cyber exercise runs against…
…
continue reading
C
Caveat


1
Critical challenges for critical infrastructure.
45:39
45:39
Play later
Play later
Lists
Like
Liked
45:39
Nick Sanna of the FAIR Institute and Safe Security joins to discuss the challenges the White House faces in attempting to harmonize critical infrastructure regulations. Ben has the story of a warrantless phone records surveillance program that is tracking over a trillion U.S. phone records annually. Dave explains how reporters from Rolling Stone tr…
…
continue reading
H
Hacking Humans


1
Encore: The age old battle between social engineering and banking.
53:34
53:34
Play later
Play later
Lists
Like
Liked
53:34
Chip Gibbons, CISO at Thrive, sits down with Dave to talk about how to defend against social engineering attacks in banking. Dave starts us off this week with a story about Amazon opening up its selling market to Pakistani residents, and what consequences that led to for the organization’s business. Joe's story follows a scam targeting soldiers in …
…
continue reading
8
8th Layer Insights


1
Artificial Intelligence: Insights & Oddities
1:05:42
1:05:42
Play later
Play later
Lists
Like
Liked
1:05:42
On this episode, Perry celebrates the one year birthday of ChatGPT by taking a look at AI from technological, philosophical, and folkloric perspectives. We see how AI was formed based on human words and works, and how it can now shape the future of human legend and belief. Guests: Brandon Karpf, Vice President at N2K Networks (LinkedIn) (Website) D…
…
continue reading
C
CyberWire Daily


1
Major crackdown on international cybersecurity.
28:40
28:40
Play later
Play later
Lists
Like
Liked
28:40
A major ransomware gang is taken down in an international sweep. CISA and the WaterISAC respond to the Aliquippa cyberattack. Attacks against infrastructure operators hit business systems. Qlik Sense installations are hit with Cactus ransomware. Researchers discover a Google Workspace vulnerability. A hacktivist auxiliary compromises a Russian medi…
…
continue reading
C
Control Loop: The OT Cybersecurity Podcast


1
Building automation systems and maritime cyber regulations.
36:48
36:48
Play later
Play later
Lists
Like
Liked
36:48
GRU's Sandworm implicated in campaign against Danish electrical power providers. Paris wastewater agency hit by cyberattack. LockBit hits Boeing. Bletchley Declaration represents a consensus starting point for AI governance. The US Executive Order on artificial intelligence is out. Guest Austin Reid of ABS Group discusses Ship and Shore challenges …
…
continue reading
C
CyberWire Daily


1
Hospitals on the hotplate after ransomware attacks.
24:06
24:06
Play later
Play later
Lists
Like
Liked
24:06
Ransomware targets healthcare organizations. WildCard deploys SysJoker malware. DPRK cryptocurrency theft. The status of Ukraine's IT Army. A Russian news outlet unmasks Killmilk. Our Industry Insights guest today is Guy Bejerano, CEO and Co-Founder of SafeBreach, discussing risk reduction in action. And there’s discord on dark markets about large …
…
continue reading
H
Hacking Humans


1
Encore: business email compromise or BEC (noun) [Word Notes]
3:47
3:47
Play later
Play later
Lists
Like
Liked
3:47
A social engineering scam where fraudsters spoof an email message from a trusted company officer that directs a staff member to transfer funds to an account controlled by the criminal.By N2K Networks
…
continue reading
W
Word Notes


1
Encore: business email compromise or BEC (noun)
3:47
3:47
Play later
Play later
Lists
Like
Liked
3:47
A social engineering scam where fraudsters spoof an email message from a trusted company officer that directs a staff member to transfer funds to an account controlled by the criminal. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy N2K Networks
…
continue reading
C
CyberWire Daily


1
Hacktivists assemble to attack Pennsylvania water utility.
20:49
20:49
Play later
Play later
Lists
Like
Liked
20:49
Iranian hacktivists claim an attack on a Pennsylvania water utility. North Korea's increased attention to supply-chains. Rhysida's action against British and Chinese targets. Sandworm activity puts European power utilities on alert. Neanderthals and the Telekopye bot. Mirai-based botnet activity. Our guest is Chris Betz, the new CISO of AWS Securit…
…
continue reading
C
CyberWire Daily


1
Chris Hare: Find just three people. [Development] [Career Notes]
9:39
9:39
Play later
Play later
Lists
Like
Liked
9:39
This week, we invite our very own Chris Hare, N2K's Project Management Specialist Content Developer, to join and discuss her career. Growing up, Chris shares that she wanted to be a veterinarian, which slowly turned into her becoming a writer for the first part of her career. She shares that she started off writing marketing copy for the technology…
…
continue reading
C
Career Notes


1
Chris Hare: Find just three people. [Development]
9:39
9:39
Play later
Play later
Lists
Like
Liked
9:39
This week, we invite our very own Chris Hare, N2K's Project Management Specialist Content Developer, to join and discuss her career. Growing up, Chris shares that she wanted to be a veterinarian, which slowly turned into her becoming a writer for the first part of her career. She shares that she started off writing marketing copy for the technology…
…
continue reading
C
CyberWire Daily


1
Encore: Another infection with new malware. [Research Saturday]
19:25
19:25
Play later
Play later
Lists
Like
Liked
19:25
Larry Cashdollar, Principal Security Intelligence Response Engineer from Akamai Technologies, joins Dave to talk about their research on "KmsdBot: The Attack and Mine Malware." Akamai's Security Research team has found a new malware that infected their honeypot, which they have dubbed KmsdBot. The research states "The malware attacks using UDP, TCP…
…
continue reading
R
Research Saturday


1
Encore: Another infection with new malware.
19:25
19:25
Play later
Play later
Lists
Like
Liked
19:25
Larry Cashdollar, Principal Security Intelligence Response Engineer from Akamai Technologies, joins Dave to talk about their research on "KmsdBot: The Attack and Mine Malware." Akamai's Security Research team has found a new malware that infected their honeypot, which they have dubbed KmsdBot. The research states "The malware attacks using UDP, TCP…
…
continue reading
C
CyberWire Daily


1
Solution Spotlight: Simone Petrella is speaking with Tatyana Bolton from Google about ways to tackle the cyber talent gap. [Interview Selects]
24:22
24:22
Play later
Play later
Lists
Like
Liked
24:22
This interview from October 20th, 2023 originally aired as a shortened version on the CyberWire Daily Podcast. In this extended interview, our very own Simone Petrella is speaking with Tatyana Bolton from Google about ways to tackle the cyber talent gap.By N2K Networks
…
continue reading
C
CyberWire Daily


1
Cops in the catfish game. [Hacking Humans Goes to the Movies]
29:18
29:18
Play later
Play later
Lists
Like
Liked
29:18
Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined by Rick Howard in this series where they view clips from their favorite movies and television shows with examples of the social engineering scams and s…
…
continue reading