Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Every Saturday, we sit down with cybersecurity researchers to talk shop about the latest threats, vulnerabilities, and technical discoveries.
…
continue reading
A fun and informative cybersecurity audio glossary from N2K.
…
continue reading
Step inside the diverse and fascinating worlds of cybersecurity professionals around the globe and hear their personal stories in their own words.
…
continue reading
The daily space intelligence and analysis that global space industry leaders and experts depend on. Published each weekday, this program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world. Visit us to learn more at https://space.n2k.com/
…
continue reading
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading
"Only Malware in the Building” is a monthly podcast crafted through a collaboration between N2K CyberWire and the Proofpoint DISCARDED podcast. Join your host Selena Larson, along with her N2K Network partner-in-crime, Dave Bittner, as they delve into the mysteries behind notable cyberattacks. This segment focuses on the most impactful and intriguing malware stories. Its aim is to distill complex cybersecurity information into digestible, insightful episodes for tech professionals, providing ...
…
continue reading
CISO Perspectives explores the evolving landscape of cybersecurity leadership, talent, and risk—because success in cybersecurity is about people, not just technology. Hosted by Kim Jones, veteran CISO and educator, this podcast challenges conventional thinking on leadership, talent pipelines, and the disconnects holding the profession back. Join Kim for candid discussions with industry leaders, and insights that help you build a stronger, more resilient cyber ecosystem.
…
continue reading
Readings from the dark underworld of cybercrime and espionage, recalled to life, reinterpreted, and reimagined for the benefit of the infosec literati. Oh, and it’s also just play and parody from the ever-restless imaginations of the N2K editorial team.
…
continue reading
Flash cybersecurity advisories from the US Government. These alerts provide timely technical and operational information, indicators of compromise, and mitigations for current major security threats, vulnerabilities, and exploits. These alerts have been edited and adapted for audio by N2K Networks as a public service.
…
continue reading
Control Loop is the OT Cybersecurity Podcast, your terminal for ICS security, intelligence, and learning. Every two weeks, we bring you the latest news, strategies, and technologies that industry professionals rely on to safeguard civilization.
…
continue reading
Get ready for a deep dive into what cybersecurity professionals often refer to as the "8th Layer" of security: HUMANS. Welcome to 8th Layer Insights (8Li). This podcast is a multidisciplinary exploration into how the complexities of human nature affect security and risk. Author, security researcher, and behavior science enthusiast Perry Carpenter taps experts for their insights and illumination. Topics include cybersecurity, psychology, behavior science, communication, leadership, and more.
…
continue reading
An occasional series from the team at the Hacking Humans podcast. N2K's Dave Bittner and co-host from the Johns Hopkins University Information Security Institute, Joe Carrigan, are joined by the N2K's Chief Security Officer and Chief analyst, Rick Howard. The team watches clips from some of their favorite movies, clips which demonstrate examples of the social engineering scams and schemes they talk about on Hacking Humans.
…
continue reading
Some U.S. banks pause electronic communications with the OCC following a major breach of the agency’s email system. Uncertainty spreads at CISA. China accuses three alleged U.S. operatives of conducting cyberattacks during February’s Asian Games. Microsoft Teams suffers filesharing issues. Fraudsters use ChatGPT to create fake passports. Car rental…
…
continue reading
Please enjoy this encore of Word Notes. A broad class of attack vectors, where an attacker supplies input to an applications command interpreter that results in unanticipated functionality. CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-injection Audio reference link: “APPSEC Cali 2018 - Taking on the King: Killing Injection Vulne…
…
continue reading
Show Notes: The cyber talent ecosystem faces severe indigestion, which has stifled growth and closed doors to new talent. In this episode of CISO Perspectives, host Kim Jones sits down with Ed Adams, the Head of Cybersecurity for North America at the Bureau Veritas Group, to discuss what has caused this indigestion and how leadership can better add…
…
continue reading
Please enjoy this encore of Word Notes. A broad class of attack vectors, where an attacker supplies input to an applications command interpreter that results in unanticipated functionality. CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-injection Audio reference link: “APPSEC Cali 2018 - Taking on the King: Killing Injection Vulne…
…
continue reading
The Department of the Interior removes top cybersecurity and tech officials. The DOJ looks to block foreign adversaries from acquiring sensitive personal data of U.S. citizens. Microsoft issues emergency updates to fix an Active Directory bug. Hackers are installing stealth backdoors on FortiGate devices. Researchers warn of a rise in “Dangling DNS…
…
continue reading

1
Blue Origin’s all-female crew launches to space.
26:40
26:40
Play later
Play later
Lists
Like
Liked
26:40Blue Origin carries the first all-female crew to the Kármán line. A leaked copy of the US Administration's 2026 budget request includes a 47% cut to NASA's science programs. NASA seeks business models that propose new approaches to solving complex Earth science problems using unconventional computing methods, and more. Remember to leave us a 5-star…
…
continue reading

1
Jennifer Walsmith: Pioneering and defining possible. [Cyber Solutions] [Career Notes]
9:24
9:24
Play later
Play later
Lists
Like
Liked
9:24Please enjoy this encore of Career Notes. Vice President for Cyber and Information Solutions within Mission Systems at Northrop Grumman, Jennifer Walsmith takes us on her pioneering career journey. Following in her father's footsteps at the National Security Agency, Jennifer began her career out of high school in computer systems analysis. Jennifer…
…
continue reading

1
Jennifer Walsmith: Pioneering and defining possible. [Cyber Solutions]
9:24
9:24
Play later
Play later
Lists
Like
Liked
9:24Please enjoy this encore of Career Notes. Vice President for Cyber and Information Solutions within Mission Systems at Northrop Grumman, Jennifer Walsmith takes us on her pioneering career journey. Following in her father's footsteps at the National Security Agency, Jennifer began her career out of high school in computer systems analysis. Jennifer…
…
continue reading
This week, we are sharing an episode of our monthly show, Only Malware in the Building. We invite you to join Dave Bittner and cohost Selena Larson as they explore "The new malware on the block." Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your h…
…
continue reading
The Space Foundation produces quarterly space reports providing data and analysis into the global space economy. Q1’s report focuses on the space workforce. It found that the space industry talent market surged in early 2025, with job postings to an industry website up 17% from the prior year. We spoke to Lesley Conn, the Director of Research & Ana…
…
continue reading
This week, we are sharing an episode of our monthly show, Only Malware in the Building. We invite you to join Dave Bittner and cohost Selena Larson as they explore "The new malware on the block." Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your h…
…
continue reading
CISA braces for widespread staffing cuts. Russian hackers target a Western military mission in Ukraine. China acknowledges Volt Typhoon. The U.S. signs on to global spyware restrictions. A lab supporting Planned Parenthood confirms a data breach. Threat actors steal metadata from unsecured Amazon EC2 instances. A critical WordPress plugin vulnerabi…
…
continue reading
India’s Bellatrix Aerospace has announced expansion of operations to the US. Privateer Space has announced a strategic investment from the Far Eastern Group. ispace-US and Zenno Power have signed an agreement to jointly develop technologies that enable lunar missions to survive the harsh lunar night, and more. Remember to leave us a 5-star rating a…
…
continue reading

1
Former cybersecurity officials lose clearances.
32:31
32:31
Play later
Play later
Lists
Like
Liked
32:31Trump targets former cybersecurity officials. Senator blocks CISA nominee over telecom security concerns. The acting head of NSA and Cyber Command makes his public debut. Escalation of Cyber Tensions in U.S.-China Trade Relations. Researchers evaluate the effectiveness of Large Language Models (LLMs) in automating Cyber Threat Intelligence. Hackers…
…
continue reading
NASA administrator nominee Jared Isaacman appeared at a confirmation hearing before the Senate Committee on Commerce, Science and Transportation. Intelsat has become the first and only satellite operator to complete a satellite life-extension mission. Sirius Space is collaborating with Ursa Major on the development of a medium-launch (ML) engine, a…
…
continue reading

1
You get a million dollars, and you get a million dollars!
37:12
37:12
Play later
Play later
Lists
Like
Liked
37:12This week, while Dave Bittner is out, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start off with a lot of follow up on listener feedback this week! Justin shares a thought about how to tra…
…
continue reading

1
Caveat Live: FBI and KU Cybersecurity Conference.
57:53
57:53
Play later
Play later
Lists
Like
Liked
57:53We've got something special for you this week! We are excited to share our very first Caveat Live event. Host Ben Yelin recently headed to the FBI and KU Cybersecurity Conference at the University of Kansas for a live session of Caveat. During the episode, Ben covered the importance of public/private partnerships with Dr. Perry Alexander. Ben and P…
…
continue reading

1
AWS in Orbit: Empowering exploration on the Moon, Mars, and more.
26:37
26:37
Play later
Play later
Lists
Like
Liked
26:37You can learn more about AWS in Orbit at space.n2k.com/aws. Our guests on this episode are AJ Gemer, CTO at Lunar Outpost and Salem El Nimri, CTO at AWS Aerospace & Satellite. Remember to leave us a 5-star rating and review in your favorite podcast app. Be sure to follow T-Minus on LinkedIn and Instagram. Selected Reading AWS Aerospace and Satellit…
…
continue reading
Treasury’s OCC reports a major email breach. Patch Tuesday updates. A critical vulnerability in AWS Systems Manager (SSM) Agent allowed attackers to execute arbitrary code with root privileges. Experts urge Congress to keep strict export controls to help slow China’s progress in AI. A critical bug in WhatsApp for Windows allows malicious code execu…
…
continue reading
The US Space Force’s (USSF) Space Systems Command (SSC) Front Door office has launched a new initiative designed to enhance unclassified threat-information-sharing with commercial space companies. Astroscale US to conduct two refueling operations of a US Department of Defense (DoD) satellite in geostationary orbit (GEO) for the USSF. Vast has annou…
…
continue reading

1
AWS in Orbit: Modernizing Satellite Management
26:31
26:31
Play later
Play later
Lists
Like
Liked
26:31You can learn more about AWS in Orbit at space.n2k.com/aws. Our guests today are Ed Meletyan, Senior Solutions Architect AWS, William Duhe, AWS Senior SW Development Engineer; and, Junk Wilson VP, Business Development at Orion Space Solutions. Remember to leave us a 5-star rating and review in your favorite podcast app. Be sure to follow T-Minus on…
…
continue reading
Is DOGE using AI to monitor federal employees? Google’s latest Android update addresses two zero-days. Scattered Spider continues its phishing and malware campaigns. Ransomware’s grip is slipping. ToddyCat exploits a critical flaw in ESET products. Oracle privately confirms a legacy system breach. Over 5,000 Ivanti Connect Secure appliances remain …
…
continue reading

1
Firefly’s Elytra selected for DIU on-orbit mission.
14:25
14:25
Play later
Play later
Lists
Like
Liked
14:25Firefly Aerospace to perform a responsive on-orbit mission with its Elytra spacecraft in support of the US Department of Defense (DoD’s) Defense Innovation Unit (DIU) Sinequone Project. A Soyuz MS-27 spacecraft carrying a three-member crew arrived at the International Space Station. Millennium Space Systems has completed the critical design review …
…
continue reading

1
OWASP cryptographic failures (noun) [Word Notes]
6:35
6:35
Play later
Play later
Lists
Like
Liked
6:35Please enjoy this encore of Word Notes. Code that fails to protect sensitive information. CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-cryptographic-failure Audio reference link: Vandana Verma. “OWASP Spotlight - Project 10 - Top10.” YouTube Video. YouTube, January 4, 2021.By N2K Networks
…
continue reading
In CISO Perspectives, Kim Jones, a CISO with over four decades of real-world security and risk management experience, sits down with industry leaders throughout this series for candid conversations that share their experiences and perspectives about the cybersecurity industry and the many challenges it faces. Whether it be cybersecurity leadership,…
…
continue reading
Please enjoy this encore of Word Notes. Code that fails to protect sensitive information. CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-cryptographic-failure Audio reference link: Vandana Verma. “OWASP Spotlight - Project 10 - Top10.” YouTube Video. YouTube, January 4, 2021. Learn more about your ad choices. Visit megaphone.fm/ad…
…
continue reading
UK court blocks government's attempt to keep Apple encryption case secret. Port of Seattle says last year's breach affected 90,000 people. Verizon Call Filter App flaw exposes millions' call records. Hackers hit Australian pension funds. A global threat hiding in plain sight. Cybercriminals are yelling CAPTCH-ya! Meta retires U.S. fact-checking pro…
…
continue reading