Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading
The FAIK Files explores the mysterious and often wacky intersection of AI, technology, and humanity. From cognitive warfare to digital deception, we examine how AI is reshaping our reality through news, research, and real-world examples. Join us for a thought-provoking journey into a world where anything can be faked, truth is increasingly elusive, and human nature meets artificial intelligence head-on.
…
continue reading
T-Minus Space Daily from N2K CyberWire delivers critical daily intelligence on what powers, protects, and connects the space industry and innovation. N2K CyberWire’s space team makes visible the global connections that facilitate connectivity and commerce through space networks. We cover the news of the day and regularly feature experts covering space’s role in critical infrastructure and national security, space operations and intelligence, data and cybersecurity in space, domestic and inte ...
…
continue reading
Threat Vector is the hit podcast from Palo Alto Networks, with over 1 million downloads and growing. Get inside the minds of top cybersecurity leaders as they break down real threats, smart defenses, and what's coming next. Each episode features insights from industry experts, customers, and Palo Alto Networks teams. It is built for security pros who want to stay ahead.
…
continue reading
"Only Malware in the Building” is a monthly podcast crafted through a collaboration between N2K CyberWire and the Proofpoint DISCARDED podcast. Join hosts Selena Larson, Threat Researcher at Proofpoint, Dave Bittner—host of the CyberWire Daily podcast—and Keith Mularski, former FBI Cyber Division Unit Chief and now Chief Global Officer at Qintel, as this trio of cyber-savvy partners-in-crime team up to uncover the secrets behind some of the most notorious cyberattacks. This segment focuses o ...
…
continue reading
Step inside the diverse and fascinating worlds of cybersecurity professionals around the globe and hear their personal stories in their own words.
…
continue reading

1
China’s stealthiest spy operation yet. [Research Saturday]
22:52
22:52
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
22:52Assaf Dahan, Director of Threat Research, Cortex XDR, at Palo Alto Networks, discussing Phantom Taurus, a new China APT uncovered by Unit 42. Unit 42 researchers have identified Phantom Taurus, a newly designated Chinese state-aligned APT conducting long-term espionage against government and telecommunications organizations across Africa, the Middl…
…
continue reading
Space has long been considered bi-partisan domain in the US, but is it becoming more political? Our guest is Kevin Kelly. Kevin is a former Senate appropriations staffer who oversaw funding for NASA, the NSF, and 25 other agencies. Now a partner at Actum, he advises some of the most influential players in science and defense. His career has spanned…
…
continue reading
A fast-spreading malware campaign is abusing WhatsApp as both lure and launchpad. Carmaker Renault suffers a data breach. DrayTek patches a critical router flaw. CISA alerts cover a range of vulnerabilities. A new phishing kit lowers the bar for convincing lures. A Catholic hospital network pays $7.6 million to settle data breach litigation. A majo…
…
continue reading

1
The UK moves to defend space-based assets.
13:11
13:11
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
13:11The UK Space Agency (UKSA) and UK Space Command have announced a new project to detect and analyse lasers being used against UK satellites. Safran Federal Systems has been awarded a contract from the Defense Advanced Research Projects Agency (DARPA). Cosmic Shielding Corporation (CSC) has been awarded a $4M Tactical Funding Increase (TACFI) contrac…
…
continue reading
Welcome back to The FAIK Files! In this week's episode: Microsoft introduces "Vibe Working" with "Agent Mode" and "Office Agent" in Microsoft 365 Copilot. We explore the hype and backlash surrounding AI video, including the saga of Tilly Norwood. Meta launches "Vibes," a new feed featuring AI-generated short-form videos, while OpenAI drops Sora 2. …
…
continue reading
CISA furloughs most of its workforce due to the government shutdown. The U.S. Air Force confirms it is investigating a SharePoint related breach. Google warns of a large-scale extortion campaign targeting executives. Researchers uncover Android spyware campaigns disguised as popular messaging apps. An extortion group claims to have breached Red Hat…
…
continue reading

1
How many anti-satellite weapons are currently in orbit?
28:13
28:13
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
28:13Intuitive Machines has completed a previously announced acquisition of KinetX, Inc. Varda Space Industries has reached an agreement with Southern Launch to extend their partnership for 20 reentries into the Koonibba Test Range in South Australia through 2028. Belgium’s Space Applications Services has joined Starlab Space as a joint venture partner …
…
continue reading

1
The High Cost of Chasing Compliance, Not Security
37:44
37:44
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
37:44Welcome to Threat Vector, the Palo Alto Networks podcast. In this episode, host David Moulton speaks with Joey Smith, Vice President & Chief Information Security Officer at Schnuck Markets. Joey brings experience from leading incident response and forensics at MasterCard to spearheading risk-based security and cloud transformation in retail. Togeth…
…
continue reading

1
Lock your doors and check your URLs.
42:56
42:56
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
42:56This week, our hosts Dave Bittner , Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are …
…
continue reading
Sarah Graham from the Atlantic Council’s Cyber Statecraft Initiative (CSI) discussing their work and findings on "Mythical Beasts: Diving into the depths of the global spyware market." Ben has the story of law enforcement agencies increasingly relying on AI to synthesize digital evidence. Dave's got the story of the Secretary of Commerce pressuring…
…
continue reading
Major federal cybersecurity programs expire amidst the government shutdown. Global leaders and experts convene in Riyadh for the Global Cybersecurity Forum. NIST tackles removable media. ICE buys vast troves of smartphone location data. Researchers claim a newly patched VMware vulnerability has been a zero-day for nearly a year. ClickFix-style atta…
…
continue reading

1
Europe secures a quantum future in space.
15:23
15:23
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
15:23Thales Alenia has signed a contract with the European Space Agency (ESA) for the Secure And cryptoGrAphic (SAGA) mission. Blue Origin has unveiled the Project Oasis program to map lunar resources. Portal Space Systems has successfully tested a solar thermal propulsion system, and more. Remember to leave us a 5-star rating and review in your favorit…
…
continue reading
CISA issues an urgent warning about active exploitation of a critical vulnerability in the sudo utility. Broadcom patches two high-severity vulnerabilities in VMware NSX. South Korea raises its national cyber threat level after a datacenter fire. Formbricks patches a critical token validation flaw. Microsoft blocks a credential phishing campaign th…
…
continue reading

1
Europe makes moves towards reusable rockets.
30:18
30:18
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
30:18Avio has signed a €40 million contract with the European Space Agency (ESA) for an in-flight demonstration of a reusable upper stage. The UK Space Agency (UKSA) is supporting 23 new projects with a £6.5 million boost from the International Bilateral Fund (IBF). Axiom Space has selected Emiliano Ventura as its first-ever “Project Astronaut”, and mor…
…
continue reading

1
Intrusion Kill Chain (noun) [Word Notes]
7:46
7:46
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
7:46Please enjoy this encore of Word Notes. A cybersecurity first principle strategy focused on disrupting known adversary activity at one of several phases of an attack sequence. CyberWire Glossary link: https://thecyberwire.com/glossary/intrusion-kill-chain Audio reference link: "Cybersecurity Days: A Network Defender's Future," by Rick Howard, I…
…
continue reading
A Chinese state-sponsored group exploited enterprise devices in a global espionage effort. The UK Government guarantees £1.5 billion financing to help Jaguar Land Rover’s recovery efforts. A maximum-severity flaw in Fortra’s GoAnywhere Managed File Transfer product is under active exploitation. The AI boom faces sustainability questions. Akira rans…
…
continue reading

1
Starlab Docking, Lunar Power, Global Space Deals.
24:07
24:07
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
24:07Northrop Grumman has successfully performed a rendezvous, proximity operations (RPO) and docking demonstration with Starlab Space Station. The American Honda Motor Company and Astrobotic Technology are developing a scalable and integrated power solution for sustained lunar surface missions. The International Astronautical Congress (IAC) has kicked …
…
continue reading

1
Joe Carrigan: Build your network. [Security engineer] [Career Notes]
10:39
10:39
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
10:39Please enjoy this encore of Career Notes. Senior security engineer with the Johns Hopkins University Information Security Institute and the Institute for Assured Autonomy, Joe Carrigan, shares what he calls his life mistake and what spurred him to finally choose a career in technology. Throughout his life, Joe had interest in technology, he even wo…
…
continue reading

1
Joe Carrigan: Build your network. [Security engineer]
10:39
10:39
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
10:39Please enjoy this encore of Career Notes. Senior security engineer with the Johns Hopkins University Information Security Institute and the Institute for Assured Autonomy, Joe Carrigan, shares what he calls his life mistake and what spurred him to finally choose a career in technology. Throughout his life, Joe had interest in technology, he even wo…
…
continue reading

1
Sunny-side spyware. [Research Saturday]
24:00
24:00
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
24:00This week, we are joined by Martin Zugec, Technical Solutions Director from Bitdefender, sharing their work and findings on "EggStreme Malware: Unpacking a New APT Framework Targeting a Philippine Military Company. A newly identified Chinese APT group has been observed deploying a sophisticated, fileless malware framework called EggStreme against a…
…
continue reading
A US Naval Research Laboratory (NRL) research team successfully conducted the first reinforcement learning (RL) control of a free-flyer in space in May. We spoke with NRL Space Roboticist Samantha Chapin, Ph.D., and NRL Computer Research Scientist Kenneth Stewart, Ph.D about the demonstration and the future of autonomous robotics in space. You can …
…
continue reading

1
CISA sounds the alarm on Cisco flaws.
24:14
24:14
التشغيل لاحقا
التشغيل لاحقا
قوائم
إعجاب
احب
24:14CISA gives federal agencies 24 hours to patch a critical Cisco firewall bug. Researchers uncover the first known malicious MCP server used in a supply chain attack. The New York SIM card threat may have been overblown. Microsoft tags a new variant of the XCSSET macOS malware. An exposed auto insurance claims database puts PII at risk. Amazon will p…
…
continue reading