The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading
A fun and informative cybersecurity audio glossary from N2K.
…
continue reading
Every Saturday, we sit down with cybersecurity researchers to talk shop about the latest threats, vulnerabilities, and technical discoveries.
…
continue reading
Step inside the diverse and fascinating worlds of cybersecurity professionals around the globe and hear their personal stories in their own words.
…
continue reading
The daily space intelligence and analysis that global space industry leaders and experts depend on. Published each weekday, this program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world. Visit us to learn more at https://space.n2k.com/
…
continue reading
"Only Malware in the Building” is a monthly podcast crafted through a collaboration between N2K CyberWire and the Proofpoint DISCARDED podcast. Join your host Selena Larson, along with her N2K Network partner-in-crime, Dave Bittner, as they delve into the mysteries behind notable cyberattacks. This segment focuses on the most impactful and intriguing malware stories. Its aim is to distill complex cybersecurity information into digestible, insightful episodes for tech professionals, providing ...
…
continue reading
Readings from the dark underworld of cybercrime and espionage, recalled to life, reinterpreted, and reimagined for the benefit of the infosec literati. Oh, and it’s also just play and parody from the ever-restless imaginations of the N2K editorial team.
…
continue reading
Flash cybersecurity advisories from the US Government. These alerts provide timely technical and operational information, indicators of compromise, and mitigations for current major security threats, vulnerabilities, and exploits. These alerts have been edited and adapted for audio by N2K Networks as a public service.
…
continue reading
CISO Perspectives explores the evolving landscape of cybersecurity leadership, talent, and risk—because success in cybersecurity is about people, not just technology. Hosted by Kim Jones, veteran CISO and educator, this podcast challenges conventional thinking on leadership, talent pipelines, and the disconnects holding the profession back. Join Kim for candid discussions with industry leaders, and insights that help you build a stronger, more resilient cyber ecosystem.
…
continue reading
Control Loop is the OT Cybersecurity Podcast, your terminal for ICS security, intelligence, and learning. Every two weeks, we bring you the latest news, strategies, and technologies that industry professionals rely on to safeguard civilization.
…
continue reading
Get ready for a deep dive into what cybersecurity professionals often refer to as the "8th Layer" of security: HUMANS. Welcome to 8th Layer Insights (8Li). This podcast is a multidisciplinary exploration into how the complexities of human nature affect security and risk. Author, security researcher, and behavior science enthusiast Perry Carpenter taps experts for their insights and illumination. Topics include cybersecurity, psychology, behavior science, communication, leadership, and more.
…
continue reading
An occasional series from the team at the Hacking Humans podcast. N2K's Dave Bittner and co-host from the Johns Hopkins University Information Security Institute, Joe Carrigan, are joined by the N2K's Chief Security Officer and Chief analyst, Rick Howard. The team watches clips from some of their favorite movies, clips which demonstrate examples of the social engineering scams and schemes they talk about on Hacking Humans.
…
continue reading
This week, we are joined by Daniel Barber, CEO and Co-Founder of DataGrail, to discuss why data privacy should matter to companies in 2025. Ben has the story of a California lawmaker’s proposal to regulate kids’ use of AI companions. Dave's got the story of a reporter's 300 mile trek through rural Virginia in search of license plate readers. While …
…
continue reading
This week our hosts, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. First, we start off with some more follow-up on EZ passes, along with the newest iteration, as Kailey Cornick sh…
…
continue reading

1
Chrome & Firefox squash the latest flaws.
30:28
30:28
Play later
Play later
Lists
Like
Liked
30:28Google and Mozilla patch nearly two dozen security flaws. The UK’s Royal Mail Group sees 144GB of data stolen and leaked. A bizarre campaign looks to recruit cybersecurity professionals to hack Chinese websites. PostgreSQL servers with weak credentials have been compromised for cryptojacking. Google Cloud patches a vulnerability affecting its Cloud…
…
continue reading
The European Union Agency for the Space Programme has selected Thales Alenia Space to extend the service life of the EGNOS satellite. Sidus Space is partnering with Lonestar Data Holdings to design, build and provide on-orbit support for six lunar data storage spacecraft. Slingshot Aerospace has been selected by AFWERX to support its Rapid Analysis…
…
continue reading
The UK unveils the full scope of its upcoming Cyber Security and Resilience Bill. Apple warns of critical zero-day vulnerabilities under active exploitation. The InterLock ransomware group claims responsibility for a cyberattack on National Presto Industries. Microsoft flags a critical vulnerability in Canon printer drivers. Check Point Software co…
…
continue reading
SpaceX has successfully launched the four-person Fram2 mission to polar orbit. The European Space Agency has released its annual space environment report. GITAI Japan has been contracted by JAXA to conduct a concept study for a robotic arm system intended for use on a pressurized crewed lunar rover, and more. Remember to leave us a 5-star rating an…
…
continue reading

1
Hello? Is it malware you’re looking for? [OMITB]
37:37
37:37
Play later
Play later
Lists
Like
Liked
37:37Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K …
…
continue reading

1
account takeover prevention (noun) [Word Notes]
6:23
6:23
Play later
Play later
Lists
Like
Liked
6:23Enjoy this encore of Word Notes. The prevention of the first part of an intrusion kill chain model exploitation technique, where the hacker steals valid logging credentials from a targeted victim. CyberWire Glossary link: https://thecyberwire.com/glossary/account-takeover-preventionBy N2K Networks
…
continue reading
Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K …
…
continue reading
Enjoy this encore of Word Notes. The prevention of the first part of an intrusion kill chain model exploitation technique, where the hacker steals valid logging credentials from a targeted victim. CyberWire Glossary link: https://thecyberwire.com/glossary/account-takeover-prevention Learn more about your ad choices. Visit megaphone.fm/adchoices…
…
continue reading

1
Ransom demands and medical data for sale.
35:52
35:52
Play later
Play later
Lists
Like
Liked
35:52A cyberattack targeting Oracle Health compromises patient data. The DOJ nabs over $8 million tied to romance scams. Trend Micro examines a China-linked APT group conducting cyber-espionage. A new Android banking trojan called Crocodilus has emerged. North Korea’s Lazarus Group targets job seekers in the crypto industry. CISA IDs a new malware varia…
…
continue reading

1
AWS in Orbit: Scaling Space Safety and Agility, with Astroscale.
23:30
23:30
Play later
Play later
Lists
Like
Liked
23:30You can learn more about AWS in Orbit at space.n2k.com/aws. Our guests today are Andrew Faiola, Commercial Vice President at Astroscale UK and Allegra Matarangas, Account Executive at AWS for Aerospace and Satellite. Remember to leave us a 5-star rating and review in your favorite podcast app. Be sure to follow T-Minus on LinkedIn and Instagram. Se…
…
continue reading
Isar Aerospace’s inaugural Spectrum launch from Norway’s Andøya Spacepor ends in a crash. NASA has amended its launch services contract with SpaceX to add Starship. NASA and Boeing say they are making progress toward crew certification of the CST-100 Starliner system, and more. Remember to leave us a 5-star rating and review in your favorite podcas…
…
continue reading

1
Alyssa Miller: We have to elevate others. [BISO] [Career Notes]
9:14
9:14
Play later
Play later
Lists
Like
Liked
9:14Please enjoy this encore episode of Career Notes. Business Information Security Officer at S&P Global Ratings, Alyssa Miller, joins us to talk about her journey to become a champion to create a welcoming nature and acceptance of diversity in the cybersecurity community. Starting her first full-time tech position while still in college, Alyssa noted…
…
continue reading

1
Alyssa Miller: We have to elevate others. [BISO]
9:14
9:14
Play later
Play later
Lists
Like
Liked
9:14Please enjoy this encore episode of Career Notes. Business Information Security Officer at S&P Global Ratings, Alyssa Miller, joins us to talk about her journey to become a champion to create a welcoming nature and acceptance of diversity in the cybersecurity community. Starting her first full-time tech position while still in college, Alyssa noted…
…
continue reading

1
Breaking barriers, one byte at a time. [Research Saturday]
22:21
22:21
Play later
Play later
Lists
Like
Liked
22:21This week, we are joined by Jon Williams, Vulnerability Researcher from Bishop Fox, discussing "Tearing Down (Sonic)Walls: Decrypting SonicOSX Firmware." Bishop Fox researchers reverse-engineered the encryption protecting SonicWall SonicOSX firmware, enabling them to access its underlying file system for security research. They presented their proc…
…
continue reading

1
Should space be designated as critical infrastructure?
26:52
26:52
Play later
Play later
Lists
Like
Liked
26:52Should space be designated as critical infrastructure? What are the threats we’re facing in space for cybersecurity? We tackle these questions with our guest Jake Braun, former White House Principal Deputy National Cyber Director and chairman of DEF CON Franklin. You can connect with Jake on LinkedIn. Remember to leave us a 5-star rating and review…
…
continue reading
This week, we are joined by Jon Williams, Vulnerability Researcher from Bishop Fox, discussing "Tearing Down (Sonic)Walls: Decrypting SonicOSX Firmware." Bishop Fox researchers reverse-engineered the encryption protecting SonicWall SonicOSX firmware, enabling them to access its underlying file system for security research. They presented their proc…
…
continue reading

1
New sandbox escape looks awfully familiar.
35:01
35:01
Play later
Play later
Lists
Like
Liked
35:01Mozilla patches Firefox flaw similar to actively exploited Chrome vulnerability. Russia-based RedCurl gang deploys ransomware for the first time. Ukraine's railway operator recovers from cyberattack. India cracks down on Google’s billing monopoly. Morphing Meerkat's phishing kit abuses DNS mail exchange records. 300,000 attacks in three weeks. Our …
…
continue reading

1
More vendors for US National Security Space Launch.
26:07
26:07
Play later
Play later
Lists
Like
Liked
26:07The United States Space Force’s (USSF) Space Systems Command (SSC) has on ramped Rocket Lab and Stoke Space for National Security Space Launch (NSSL) missions. Northrop Grumman's Cygnus cargo freighter NG-22 mission to the International Space Station (ISS) has been delayed indefinitely. The United Nations (UN) agencies for telecommunications, aviat…
…
continue reading
China’s FamousSparrow is back. A misconfigured Amazon S3 bucket exposes data from an Australian fintech firm. Researchers uncover a sophisticated Linux-based backdoor targeting industrial systems. Infiltrating the BlackLock Ransomware group’s infrastructure. Solar inverters in the security spotlight. Credential stuffing gets automated. CISA updates…
…
continue reading

1
Vulcan certified for National Security Space Launch.
28:44
28:44
Play later
Play later
Lists
Like
Liked
28:44The United States Space Forces’ (USSF) Space Systems Command (SSC) has certified United Launch Alliance’s (ULA) Vulcan launch system for National Security Space Launch (NSSL) missions. NASA’s Starling spacecraft swarm has demonstrated maneuvers with SpaceX’s Starlink constellation. Gravitics, Inc. has been selected for a Strategic Funding Increase …
…
continue reading
This week, we are joined by Tara Wisniewski, EVP for Advocacy, Global Markets and Member Engagement at ISC2 discussing their work on "Navigating Global Transitions: Cybersecurity's Role Amid Political Change?" Ben and Dave both tackle the questionable and potentially illegal use of Signal by high level Trump officials after a text message got sent …
…
continue reading
This week our hosts, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow-up on E-ZPass scams—a listener suggests that scammers may be exploiting exposed licens…
…
continue reading
The European Union Agency for Cybersecurity (ENISA) has released a new report on the threat landscape in space. Sateliot has received a €13.8 million investment from the Spanish Society for Technological Transformation. Sierra Space and Yuri have signed an agreement for a new space-based medical research mission, and more. Remember to leave us a 5-…
…
continue reading
Researchers uncover a new Windows zero-day. A covert Chinese-linked network targets recently laid-off U.S. government workers. Malicious npm packages are found injecting persistent reverse shell backdoors. A macOS malware loader evolves. DrayTek router disruptions affect users worldwide. A new report warns of growing cyber risks to the commercial s…
…
continue reading