Cybersecurity public [search 0]
×
Join millions of Player FM users today to get news and insights whenever you like, even when you're offline. Podcast smarter with the free podcast app that refuses to compromise. Let's play!
Join the world's best podcast app to manage your favorite shows online and play them offline on our Android and iOS apps. It's free and easy!
More
show episodes
 
H
Hackable?
Monthly
 
We see lots of movies and TV shows where hackers can infiltrate our lives with just a few keystrokes. But is it real? We’re here to find out. Malicious cat photos, sketchy Wi-Fi networks, rogue rentals, all-knowing webcams - those are just a few topics tackled in Hackable?, where we let our hackers shed light on just how secure we really are.Winner of Best Branded Podcast - 10th Annual Shorty Awards.
 
T
The CyberWire
Daily
 
More signal, less noise—we distill the day’s critical cyber security news into a concise daily briefing.
 
T
The CyberWire
รายวัน
 
More signal, less noise—we distill the day’s critical cyber security news into a concise daily briefing.
 
We are giving an inside look into the minds of today's cybersecurity leaders and defining trends for the upcoming threat landscape, what’s top of mind for security leaders, and advise for security leaders and practitioners.
 
Forcepoint’s To The Point Cybersecurity Podcast covers the latest cyber news, threats, and trends impacting the federal government.
 
Kaspersky Lab’s security experts discuss recent news and give their advice on the topics of computer and smartphone protection.
 
ITSPmagazine is free online publication that focuses on information technology, cybersecurity, data privacy, the InfoSec community and the influence that all this has on our everyday lives – as businesses, individuals and the society in which we live.Delivered through articles, podcasts, webcasts, webinars, live panels, event coverage and talk shows, our team of cybersecurity experts explores the topics that matter the most: the human element and its symbiotic effect on the latest in technol ...
 
S
Smashing Security
Weekly
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast...Winner: "Best Security Podcast 2018" and "Best Security Podcast 2019."Follow the podcast on Twitter at @SmashinSecurity, and subscribe for free in your favourite podcast app. New episodes released at 7pm EST every Wednesday (midnight UK).
 
Discussions, tips, and debates around improving the communications and services that security vendors provide to their customers, the security buyer.
 
A weekly podcast on cybersecurity and privacy from the cyberlaw practice at Steptoe and Johnson. Featuring Stewart Baker and Michael Vatis.
 
Recorded Future takes you inside the world of cyber threat intelligence. We’re sharing stories from the trenches and the operations floor as well as giving you the skinny on established and emerging adversaries. We also talk current events, technical tradecraft, and offer up insights on the big picture issues in our industry. Join the Recorded Future team, special guests, and our partners from the CyberWire to learn everything you want to know (and maybe some things you’d rather not know) ab ...
 
Do boards and business leaders understand the risks? Is security improving, barely keeping up with threats, or falling painfully behind? And more importantly, if what kept us secure has stopped working, what do we need to do to fix it? Join host Brian Contos and his guests as they explore these questions on The Cybersecurity Effectiveness Podcast. Learn more about the Verodin Security Instrumentation Platform at https://www.verodin.com #InstrumentSecurity #ProveSecurity
 
Our online life is real life. We walk, talk, work, LOL and even love on the Internet – but we don’t always treat it like real life. Host Manoush Zomorodi explores this disconnect with stories from the wilds of the Web, and gets to the bottom of online issues that affect us all. Whether it’s privacy breaches, closed platforms, hacking, fake news, or cyber bullying, we the people have the power to change the course of the Internet, keeping it ethical, safe, weird, and wonderful for everyone. I ...
 
Don Pezet and Peter VanRysdam cover a whirlwind of tech topics each week from interviews with industry experts and up-and-coming companies to commentary on topics like security, vendor certifications, networking, and just about anything IT related.
 
Security In 5 brings you security news, tips and opinions on information IT and general security in about five minutes. Straight and to the point information in a timeframe you can easily listen to in one sitting. Whether you are a security professional or someone that wants to keep personal data safe this podcast will cover everyone. Be aware, be safe, welcome to Security In 5.
 
Podcast for fans of supercomputing and other technology topics. Since 2012.
 
CSIS looks at how rapidly changing technology and cybersecurity are affecting the world in the twenty-first century. Issues covered include intelligence, surveillance, encryption, privacy, military technology, space, and more. Programs leading the research on this topic include the Technology Policy Program and the International Security Program.Find the latest research from our scholars and CSIS events on this topic below.
 
A
AFP Conversations
Weekly
 
Corporate treasury and finance executives discuss their biggest challenges and insights: blockchain, fintech, cybersecurity, payments, risk, FP&A, budgeting, forecasting, leadership, career development, and more.
 
Threatpost writers Mike Mimoso and Chris Brook discuss security threats, attacks, vulnerability research and trends with a variety of industry executives, researchers and experts.
 
S
State of the Hack
Monthly
 
State of the Hack is hosted by FireEye's Christopher Glyer (@cglyer) and Nick Carr (@itsreallynick), that discusses the latest in information security, digital forensics, incident response, cyber espionage, APT attack trends, and tales from the front lines of significant targeted intrusions.
 
I
InSecurity
Щотижня
 
Every week on the InSecurity Podcast, Matt Stephenson interviews leading authorities in the security industry to gain an expert perspective on topics including risk, control friction, compliance, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.
 
K
KnowTechTalk
Monthly+
 
 
E
End of the Road
Weekly
 
Exploring the Horizons we never touch, because we are already there....with Michael Kokal Available on iTunes, Spotify Stitcher, Google play, or wherever you find your favorite podcasts.
 
Recorded Future takes you inside the world of cyber threat intelligence. We’re sharing stories from the trenches and the operations floor as well as giving you the skinny on established and emerging adversaries. We also talk current events, technical tradecraft, and offer up insights on the big picture issues in our industry. Join the Recorded Future team, special guests, and our partners from the CyberWire to learn everything you want to know (and maybe some things you’d rather not know) ab ...
 
Entertaining stories of how others got into Information Security (aka cybsersecurity), their experiences, lessons learned, and advice about getting in. Join my newsletter.Listen for an "Easter Egg" in each show!If you're looking to break into infosec, I wrote a little guide! Check it out:“I purchased the kindle book last night and just finished it. It was a great “mini-mentoring” session, and I felt encouraged to persevere. I plan to listen to the podcasts regularly. As a woman getting into ...
 
D
Defense in Depth
Weekly
 
Join Allan Alford, former CISO of Mitel, and David Spark, founder of CISOSeries.com, each week as we choose one controversial cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
 
E
Eye on Security
Monthly
 
The latest on cybersecurity threats and news from FireEye.
 
R
Random but Memorable
Monthly+
 
Lighthearted security advice and banter from 1Password and guests.
 
I
InSecurity
Weekly
 
Every week on the InSecurity Podcast, Matt Stephenson interviews leading authorities in the security industry to gain an expert perspective on topics including risk, control friction, compliance, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.
 
C
Cybersecurity Café
Monthly+
 
Co-hosts Louisa and Beverley met 7 years ago over a shared passion for cybersecurity (and coffee - they live in Melbourne after all!). In this podcast, using their combined 30 years of global experience in cybersecurity, they will bring you the experts, the insights and the research impacting the cybersecurity profession today. Proudly independent they have full creative control over the show and invite listeners to provide feedback and ask questions to ensure this show always belongs to the ...
 
C
CyberCast
Monthly
 
CyberCast offers a different and thoughtful perspective on the cybersecurity issues facing industry and government today.
 
Don Pezet and Peter VanRysdam cover a whirlwind of tech topics each week from interviews with industry experts and up-and-coming companies to commentary on topics like security, vendor certifications, networking, and just about anything IT related.
 
S
Securiosity
Щотижня
 
Securiosity is a weekly cybersecurity podcast from Scoop News Group. Greg Otto and Jen O’Daniel will spend each week answering the overarching questions from the latest in security and privacy news. They’ll also talk to leaders in both the public and private sector on how they view the ever-changing cybersecurity landscape. Policy, research, venture capital…they’ll examine it all. If you’re curious like us, like and subscribe now. Securiosity. You have questions. So do we.
 
Threatpost writers Mike Mimoso and Chris Brook discuss security threats, attacks, vulnerability research and trends with a variety of industry executives, researchers and experts.
 
In its mission to deliver unique, most secure and highly versatile technologies to software publishers and intelligent device manufacturers, Wibu-Systems has developed CodeMeter, a comprehensive and award-winning suite of hardware- and software-based entitlement solutions for the protection of software rights and technical know-how against piracy, reverse engineering, tampering, sabotage, and espionage.
 
Constellations from Kratos is your connection to the innovators, business leaders, entrepreneurs and policy makers who are making ... and remaking ... today's satellite and space industries. The current explosion in innovation is revolutionizing communications, imagery, defense and research and has caused a culture shift within the traditional satellite and space industry landscapes. New Space versus Old Space, GEO versus LEO Satellites, Narrowband versus Wideband, High-Throughput Satellites ...
 
M
Mornings With Mark
Weekly
 
Daily-ish (M--F) musings about security and privacy and how it impacts our communities. What questions should as technologists be asking as we build?Watch the show at https://4mn.ca/mwm-video
 
Passionate about creating a cyber security community for all levels within an organization. #CISOtalk
 
Every 2 weeks, Conor Gilsenan hosts a conversation with creators, researchers, founders, and advocates who are working to improve the usability of security and privacy technologies.Guests share what they are currently working on, how they got to where they are today, who they are trying to help, and what keeps them motivated to overcome challenges along the way.The goal is for the rest of us to learn from their experiences and go on to promote usable security and privacy within our own proje ...
 
G
GovCast
Monthly+
 
GovCast tells the personal stories of the government and industry leaders transforming the public sector, and the bits and pieces typically not covered by federal IT publications. Put on by GovernmentCIO Media & Research, we share untold stories about how these influencers got to where they are, their passions in and outside of technology and the roadblocks they’ve conquered. 561480
 
In Falken's Maze, technologist and former professor Jason Thomas explores the intersection of technology, history, and culture. Created for listeners nostalgic for the 80s who also want to understand the complexities of today, our show demystifies the world's most compelling technologies and events through 80's movies, music, and television. This is where history, tech, and retro pop collide.
 
In this unprecedented TEDx-style podcast, former covert CIA intelligence officer Andrew Bustamante discusses real-world international espionage techniques that can be used in everyday life. From business to personal relationships, spies know how to control their environment, drive predictable behavior, and gain unique advantages. Secrets once reserved for the world's elite intelligence services are now brought to light. Welcome to Everyday Espionage!
 
This podcast shines a light on a range of topics regarding Information Security including data security laws, cyber threat detection, driving information technology to leverage your business, and so much more. The podcast is brought to you by the Information Security Summit which is a non-profit organization headquartered in Cleveland, OH. Additional information can be found at www.informationsecuritysummit.org.
 
Welcome to the BitSight Risk Review. Listen as we discuss the latest cybersecurity trends, current events, and talk more in-depth about the application of security ratings.
 
C
Cyber Security Today
Еженедельно+
 
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
 
Security Advisor Alliance - A regular community podcast aimed at Information Security professionals to discuss latest news stories, new strategies and new ideas.
 
M
Malicious Life
Monthly+
 
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
 
Loading …
show series
 
It was a pleasure to host Dr. Alexander A. Schwarzmann, Dean of the School of Computer and Cyber Sciences at Augusta University******Thank you to today’s sponsor: Get Smart EyeHere’s how iOS users only can access Smart Eye! 1. Text to: 414112. Type in the message of your text: Smarteye3. Reply to the SMS text: Y4. Download the Apple Test Flight ...…
 
It’s not every day that you get to spend time with the current president of an association alongside one of the original founders of that same association—especially when it was founded over 35 years ago and is still going strong!Well, this exact thing happened to us during the ISSA International Summit in Dallas, Texas. We were honored to be p ...…
 
Cybersecurity: https://thehackernews.com/2019/10/simjacker-vulnerability-exploit.html Pitney Bowes Hit with Ransomware Attack https://www.zdnet.com/article/m6-one-of-frances-biggest-tv-channels-hit-by-ransomware/?ftag=COS-05-10aaa0g&utm_campaign=trueAnthem%3A+Trending+Content&utm_content=5da5bf6a594d1700014c652e&utm_medium=trueAnthem&utm_source ...…
 
Part 2 - Data Scientist and Psychologist Margaret Cunningham breaks down the "human" factors of a cybersecurity breach.
 
In this episode of HACKED, Ben talks with the owner of Penetration Testing firm, Black Hills Information Security about the business and profession of pen testing and their incident response card gameBy Talking cybersecurity with nexus IT Security group.
 
On this week’s show, we welcome back Lauren Zabierek. The last time she joined us, she was a senior intelligence analyst at Recorded Future, but she’s since taken on the role of director of the cybersecurity project at Harvard’s Belfer Center. She shares the mission of her organization, the role she thinks it has to play on the national and int ...…
 
BitPaymer ransomware is exploiting an Apple zero-day. “Attor” isn’t your ordinary malign faerie: it’s also an espionage platform that’s been carefully deployed against Russian and Eastern European targets. FIN7 upgrades its toolkit. Apple does what the Chinese government asks it to do, blocking a mapping and a news app from users in China. And ...…
 
Cybersecurity awareness in your business is a critical component no matter your business side. This epsiode talk about how everyone is a target. Be aware, be safe. Sign-Up For FREE security awareness training here. Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five Don't forget to subscribe t ...…
 
THE INTRO Data is everywhere including in Louisa's living room in many different forms (thanks to Star Trek!) We know data is being created in large volumes and we know it can be used in a negative way but how do we know we have the right systems in place now and in the future to effectively govern it Beverley says there is a lot of debate abou ...…
 
The manufacturers who will still be holding the reins in tomorrow’s markets are the ones who are first to understand that the product ownership era is coming to an end, to transition from products to services, to rethink their entire supply chain from a radically new perspective, to implement newer licensing models and enable license updates tr ...…
 
This episode explores the landscape of China’s civilian and commercial space efforts in recent years. Our guest, Dr. Alanna Krolikowski, analyzes China’s recent achievements in space, including the landing of a rover on the far side of the moon and the first successful launch of a satellite by a private Chinese company. She also examines the re ...…
 
Today’s teens interact daily with technology more than ever before. Ease of access to the online world for things such as streaming, social media, and shopping comes with the big responsibility to develop smart computer habits early in life. This episode features the series’ youngest guest to date: seventh-grader Athena Contos, who shares perso ...…
 
All links and images for this episode can be found on CISO Series (https://cisoseries.com/wait-what-good-news-in-cybersecurity/) On this episode of CISO/Security Vendor Relationship Podcast, cybercrime fails and we brag about it. This episode is hosted by me, David Spark (@dspark), producer of CISO Series and founder of Spark Media Solutions an ...…
 
Snowden is being sued, Emotet is back and we look at why exactly there is a cybersecurity workforce shortage. In our interview, we talk to Danny Adamitis and Elizabeth Wharton of Prevailion. Last week we told you about their research into a phishing campaign hiding in Microsoft Word macros. We get them to dive deeper and tell us what their comp ...…
 
Researchers at Independent Security Evaluators (ISE) recently published a report titled SOHOpelessly Broken 2.0, Security Vulnerabilities in Network Accessible Services. This publication continues and expands previous work they did examining small office/home office (SOHO) routers, network-attached storage devices (NAS), and IP cameras. Shaun M ...…
 
Researchers at Independent Security Evaluators (ISE) recently published a report titled SOHOpelessly Broken 2.0, Security Vulnerabilities in Network Accessible Services. This publication continues and expands previous work they did examining small office/home office (SOHO) routers, network-attached storage devices (NAS), and IP cameras. Shaun M ...…
 
One highly watched Russian hacker group just kept on hacking while we watched. We will talk about what some researchers unveiled this week. In our interview, we talk to Ori Eisen, Founder and CEO of Trusona about his quest to move both consumers and enterprises away from two-factor authentication.By Scoop News Group.
 
Clickfraud arrives via a third-party SDK, and the app developers who used it say they didn’t know nuthin’. Maybe they didn’t. A Trojanized TOR browser warns its bro’s that, whoa, you’re out of date and the police might see you, but it’s really just stealing the bros’ alt-coin. WiFi bugs are fixed in Kindle and Alexa. Don’t try to jailbreak your ...…
 
Clickfraud arrives via a third-party SDK, and the app developers who used it say they didn’t know nuthin’. Maybe they didn’t. A Trojanized TOR browser warns its bro’s that, whoa, you’re out of date and the police might see you, but it’s really just stealing the bros’ alt-coin. WiFi bugs are fixed in Kindle and Alexa. Don’t try to jailbreak your ...…
 
US carries out secret Iran cyber hit after Aramco raid & Ron Wyden wants Facebook to ‘mind your own business’ with new privacy bill today on the Friday wrap up!Thank you to today’s sponsor: CyberHub USA"We prepare your people to protect and operate your business against cyber threats"Visit cyberhubusa.co today for a free consultation…
 
Two major security issues with popular smartphones this week. First the Samsung Galaxy S10 and then the Google Pixel 4. For the Galaxy, it's fingerprint reader currently accepts any fingerprint to unlock the device and authorized activities. While the Pixel does not require attention for facial recognition to unlock the device or authorize acti ...…
 
As it becomes more difficult and expensive to infiltrate environments via malware, cybercriminals may start turning in the future to a more viable and less costly alternative: Insider threats.By Mike Mimoso, Chris Brook.
 
As it becomes more difficult and expensive to infiltrate environments via malware, cybercriminals may start turning in the future to a more viable and less costly alternative: Insider threats.By Mike Mimoso, Chris Brook.
 
Eventually your small business will grow and you will need a professional voice phone system. Grasshopper is a virtualized phone system that can get you up and running quickly from any device you have, not tied to a cellular or desk phone. As a special offer to listeners you can get $50 off your order here - http://trygrasshopper.com/securityin ...…
 
Today's podcast covers a Canada Post password alert, a new sextortion campaign, Samsung phone fingerprint trouble, malware in sound files and exposed resumesBy ITWC.
 
RISC-V, Historic Passwords Revealed, End of the World We’re missing Henry S. Newman this week, who is down in Los Cruces inspecting and overseeing the construction of his new crib. Dan and Shahin discuss just how little they’d want to be the general contractor working to build Henry’s house. Henry would be deploying a set of lasers to make sure ...…
 
Cozy Bear isn’t back--Cozy Bear never really left at all. Iran says the Americans are dreaming: there was no cyberattack in retaliation for Iran’s implausibly deniable missile strikes on Saudi oil fields last month. Malicious audio files are dropping cryptominers and reverse shells into victim systems. An international dragnet collars hundreds ...…
 
Cozy Bear isn’t back--Cozy Bear never really left at all. Iran says the Americans are dreaming: there was no cyberattack in retaliation for Iran’s implausibly deniable missile strikes on Saudi oil fields last month. Malicious audio files are dropping cryptominers and reverse shells into victim systems. An international dragnet collars hundreds ...…
 
October is Security Awareness Month and this epsiode talks about your security program's best line of defense, your employees. Be aware, be safe. Sign-Up For FREE security awareness training here. Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five Don't forget to subscribe to the Security In ...…
 
All links and images for this episode can be found on CISO Series (https://cisoseries.com/defense-in-depth-cyber-defense-matrix/) A simple way to visualize your entire security program and all the tools that support it. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spa ...…
 
After a two-week hiatus from the podcast, Dave returns for the 114th installment of the Transatlantic Cable Podcast. We open the episode looking at the latest news on the Facebook front. Unlike most of our podcasts, the focus won’t be on privacy snafus, instead, we will look at the latest news with Facebook’s Libra. Following up on that, we hea ...…
 
Today’s Cyber Stalkers have free access to almost government-grade spyware software with which they can terrorize their victims. Who’s enabling the commercial spyware market? The post How is Spyware Legal? appeared first on Malicious Life.By Malicious Life.
 
Footballers' wives go to war over Instagram leaks, it turns out fake news is fine on Facebook (just so long as it's in a political ad), and things take a horrific turn in Japan, as a stalker uses a scary technique to find out where his pop idol lives. All this and much much more is discussed in the latest edition of the "Smashing Security" podc ...…
 
Footballers' wives go to war over Instagram leaks, it turns out fake news is fine on Facebook (just so long as it's in a political ad), and things take a horrific turn in Japan, as a stalker uses a scary technique to find out where his pop idol lives. All this and much much more is discussed in the latest edition of the "Smashing Security" podc ...…
 
The US may have retaliated in cyberspace for Iran’s strikes against Saudi oil fields. China’s new C919 airliner seems to have benefited greatly from industrial espionage. An old botnet learns new tricks. Typosquatting as an election influence trick. A look at price lists in the Criminal-to-Criminal marketplace. Recovering from ransomware. And w ...…
 
The US may have retaliated in cyberspace for Iran’s strikes against Saudi oil fields. China’s new C919 airliner seems to have benefited greatly from industrial espionage. An old botnet learns new tricks. Typosquatting as an election influence trick. A look at price lists in the Criminal-to-Criminal marketplace. Recovering from ransomware. And w ...…
 
On this episode of the Constellations podcast, we will talk about the emergence of the ground segment-as-a-service. We will also discuss how the space industry is shifting away from GEO satellites to LEO and MEO satellites and how that is affecting the ground segment. Find out the importance of having increased coverage in the southern hemisphe ...…
 
Pitney Bowes Says Ransomware Behind System Outages, FIN7 Gang Returns With New Malicious Tools, 'Silent Librarian' Revamps Phishing Campaign, FTC deploys cybersecurity tips and best practices for small businesses - Plus more! Today on your Daily Cyber Briefing!Thank you to today’s sponsor: CyberHub USA"We prepare your people to protect and oper ...…
 
With so many malicious adversaries trying to penetrate companies' networks, companies are forgetting to watch out for a dangerous threat from within their own ranks -insider threats. Threatpost talks to Digital Guardian's Tim Bandos to learn more about the insider threat of departing employees - and what companies can do to protect data loss.…
 
With so many malicious adversaries trying to penetrate companies' networks, companies are forgetting to watch out for a dangerous threat from within their own ranks -insider threats. Threatpost talks to Digital Guardian's Tim Bandos to learn more about the insider threat of departing employees - and what companies can do to protect data loss.…
 
Microsoft and The US National Institute of Standards and Technology (NIST) are partnering together on a new guide for Enterprise Patching Practices. This epsiode talks about the guide and why this is a good and unique move. Be aware, be safe. Sign-Up For FREE security awareness training here. Become A Patron! Patreon Page *** Support the podcas ...…
 
It was a pleasure to host Eric Parker, Founder and President of theClubhou.se #CISOtalk #NCSAM******Thank you to today’s sponsor: Get Smart EyeHere’s how iOS users only can access Smart Eye! 1. Text to: 414112. Type in the message of your text: Smarteye3. Reply to the SMS text: Y4. Download the Apple Test Flight app5. Go back to your SMS text a ...…
 
Healthcare is under attack. Healthcare organizations are prime targets for hackers due to the valuable protected health information (PHI) they store and the vital role they play in our nation’s critical infrastructure. Indeed, 89 percent of healthcare organizations have experienced a data breach in the past two years and the sector was the lead ...…
 
Today's podcast reports on an online trust survey of Canadians, Internet toilet fears, how often do sites let you delete your browsing data and why you should forget about jailbreaking your smartphonesBy ITWC.
 
In part 2 of this At The Edge podcast, we continue to look at the state of cybersecurity in Europe with a deeper dive into Ireland.As John Durcan reviews organizations and examines their business ideas and supporting technology, he's seeing more companies tying in the security piece right from the beginning. Companies are finally grasping the c ...…
 
Our interview is with Sultan Meghji, CEO of Neocova. We cover the large Chinese investment in quantum technology and what it means for the United States. It’s possible that Chinese physicists are even better than American physicists at extracting funding from their government. Indeed, it looks as though some quantum tech, such as the use of ent ...…
 
Ransomware hits companies in France and the US. A Finnish energy company sustains a suspicious IT incident. Turkey jams social media as it rolls tanks against the Kurds. Pegasus spyware said to be in use against Moroccan activists. Silent Librarian is still making noise. The Lazarus Group is back with a malign crypto-trading app. China tightens ...…
 
Ransomware hits companies in France and the US. A Finnish energy company sustains a suspicious IT incident. Turkey jams social media as it rolls tanks against the Kurds. Pegasus spyware said to be in use against Moroccan activists. Silent Librarian is still making noise. The Lazarus Group is back with a malign crypto-trading app. China tightens ...…
 
Google login Twitter login Classic login