Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
N2k Networks public
[search 0]
More
Download the App!
show episodes
 
Artwork
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
The daily space intelligence and analysis that global space industry leaders and experts depend on. Published each weekday, this program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world. Visit us to learn more at https://space.n2k.com/
  continue reading
 
Artwork

1
The FAIK Files

Perry Carpenter | N2K Networks

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
The FAIK Files explores the mysterious and often wacky intersection of AI, technology, and humanity. From cognitive warfare to digital deception, we examine how AI is reshaping our reality through news, research, and real-world examples. Join us for a thought-provoking journey into a world where anything can be faked, truth is increasingly elusive, and human nature meets artificial intelligence head-on.
  continue reading
 
Artwork

1
Caveat

N2K Networks

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
  continue reading
 
Artwork

1
Only Malware in the Building

DISCARDED | N2K Networks

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
"Only Malware in the Building” is a monthly podcast crafted through a collaboration between N2K CyberWire and the Proofpoint DISCARDED podcast. Join hosts Selena Larson, Threat Researcher at Proofpoint, Dave Bittner—host of the CyberWire Daily podcast—and Keith Mularski, former FBI Cyber Division Unit Chief and now Chief Global Officer at Qintel, as this trio of cyber-savvy partners-in-crime team up to uncover the secrets behind some of the most notorious cyberattacks. This segment focuses o ...
  continue reading
 
Artwork

1
Threat Vector by Palo Alto Networks

Palo Alto Networks and N2K Networks

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Threat Vector, Palo Alto Networks podcast, is your premier destination for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersec ...
  continue reading
 
The Need-to-Know podcast deals with the now acknowledged reality of Unidentified Aerial Phenomena or UAP. Its hosts are award-winning broadcasters and investigative journalists Ross Coulthart and Bryce Zabel. Every episode, they’ll look at what’s happened in the UAP/UFO world. Coulthart and Zabel discuss their current investigations, give each other advice, and seek to answer the big questions: who are they and what do they want? Ross Coulthart’s work has been featured on Australia’s version ...
  continue reading
 
Loading …
show series
 
GRC (Governance, Risk, and Compliance) and DevSecOps (Development, Security, and Operations) are complementary frameworks that aim to ensure secure and compliant software development. Our guest today is Brandon Karpf, friend of the show, founder of T-Minus Space Daily, and cybersecurity expert. Brandon explains  why integrated GRC and DevSecOps are…
  continue reading
 
This week, Dave speaks with Max Gannon of Cofense Intelligence to dive into his team's research on "The Rise of Precision-Validated Credential Theft: A New Challenge for Defenders." Threat actors continuously develop new tactics, techniques, and procedures (TTPs) to bypass existing defenses. When defenders identify these methods and implement count…
  continue reading
 
NATO hosts the world’s largest cyber defense exercise. The DOJ charges a dozen people in a racketeering conspiracy involving the theft of over $230 million in cryptocurrency. Japan has enacted a new Active Cyberdefense Law. Lawmakers push to reauthorize the Cybersecurity Information Sharing Act. Two critical Ivanti Endpoint Manager Mobile vulnerabi…
  continue reading
 
Gilmour Space has delayed the inaugural launch of its Eris spacecraft after the nose cone fell off the rocket ahead of liftoff. NASA has selected Rocket Lab to launch the agency’s Aspera mission. Space solar company Solestial has raised $17 Million in a Series A funding round, and more. Remember to leave us a 5-star rating and review in your favori…
  continue reading
 
Welcome back to The FAIK Files! In this week's episode: An Australian radio station created a fake Asian female host using AI The BBC resurrects Agatha Christie while a family member brings a murder victim to court We break down "Strategic Text Strings" - sequences of gibberish that can jailbreak AI systems AI recruitment tools might be making hiri…
  continue reading
 
Google issues an emergency patch for a high-severity Chrome browser flaw. Researchers bypass BitLocker encryption in minutes. A massive Chinese-language black market has shut down. The CFPB cancels plans to curb the sale of personal information by data brokers. A cyberespionage campaign called Operation RoundPress targets vulnerable webmail servers…
  continue reading
 
China has launched 12 satellites in the first deployment of a space computing constellation. Venus Aerospace completed the first US flight test of a Rotating Detonation Rocket Engine (RDRE). Viasat has selected Blue Origin to launch the demonstration of its InRange launch telemetry relay service, and more. Remember to leave us a 5-star rating and r…
  continue reading
 
In this episode of Threat Vector, Ofer Ben‑Noon steps in as guest host to interview cybersecurity strategist Kirsten Davies. They explore why browsers now handle 85 percent of work and how that shift makes them the prime attack surface. Learn how phishing and session hijacks exploit low‑friction paths, why Zero Trust and enterprise browsers must wo…
  continue reading
 
This week on Caveat, Dave and Ben welcome back N2K’s own Ethan Cook for our latest policy deep dive segment. As a trusted expert in law, privacy, and surveillance, Ethan is joining the show regularly to provide in-depth analysis on the latest policy developments shaping the cybersecurity and legal landscape. While this show covers legal topics, and…
  continue reading
 
And....we're back! This week, our three hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are all back to share the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. The team shares three bits of follow-up and then breaks into their stories. Joe star…
  continue reading
 
A busy Patch Tuesday. Investigators discover undocumented communications devices inside Chinese-made power inverters. A newly discovered Branch Privilege Injection flaw affects Intel CPUs. A UK retailer may claim up to £100mn from its cyber insurers after a major cyberattack. A Kosovo national has been extradited to the U.S. for allegedly running a…
  continue reading
 
British ISAM company Space Forge has raised $29.8 million in a Series A Funding Round led by the NATO Innovation Fund. ICEYE has signed a €200 million agreement to produce three SAR satellites for the Polish Armed Forces. Ramon Space has been selected by Eutelsat to provide onboard digital communication channelizers for the expansion of its OneWeb …
  continue reading
 
House Republicans look to limit state regulation of AI. Spain investigates potential cybersecurity weak links in the April 28 power grid collapse. A major security flaw has been found in ASUS mainboards’ automatic update system. A new macOS info-stealing malware uses PyInstaller to evade detection. The U.S. charges 14 North Korean nationals in a re…
  continue reading
 
The US Defense Innovation Unit (DIU) has selected new companies to join its effort to build a secure network of military and commercial communication satellites. The US Space Force (USSF) Space Systems Command (SSC) has selected Auria Space and Sphinx Defense to each develop and deploy a secure, cloud-based Joint Antenna Marketplace (JAM) prototype…
  continue reading
 
Please enjoy this encore of Word Notes. An open source Java-based software tool available from the Apache Software Foundation designed to log security and performance information. CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/log4j⁠ Audio reference link: “⁠CISA Director: The LOG4J Security Flaw Is the ‘Most Serious’ She’s Seen in Her …
  continue reading
 
A major student engagement platform falls victim to the ClickFix social engineering attack. Google settles privacy allegations with Texas for over one point three billion dollars. Stores across the UK face empty shelves due to an ongoing cyberattack. Ascension Health reports that over 437,000 patients were affected by a third-party data breach. A c…
  continue reading
 
The failed Soviet Venus lander Kosmos 482 crashed into sea after 53 years in orbit. Redwire Corporation reports financial results from the first quarter. Viasat’s GX10A and GX10B satellite payloads are now available to deliver services for government customers, and more. Remember to leave us a 5-star rating and review in your favorite podcast app. …
  continue reading
 
Enjoy this encore of Career Notes. Executive Security Advisor at IBM Security Limor Kessem says she started her cybersecurity career by pure chance. Limor made a change from her childhood dream of being a doctor and came into cybersecurity with her passion, investment, discipline, and perseverance. Limor talks about how we must tighten our core sec…
  continue reading
 
Cybersecurity is no longer confined to the digital world or just a technical challenge, it’s a global imperative. The NightDragon Innovation Summit convened a group of industry leaders to discuss how public and private entities can work together to address emerging threats and harness the power of AI, cybersecurity, and innovation to strengthen nat…
  continue reading
 
Robert Hutchings Goddard was an American engineer, professor, physicist, and inventor known as the godfather of modern rocketry. He is credited with creating and building the world's first liquid-fueled rocket, which was successfully launched on March 16, 1926. By 1915, his pioneering work had dramatically improved the efficiency of the solid-fuele…
  continue reading
 
This week, we are joined by Lucija Valentić, Software Threat Researcher from ReversingLabs, who is discussing "Atomic and Exodus crypto wallets targeted in malicious npm campaign." Threat actors have launched a malicious npm campaign targeting Atomic and Exodus crypto wallets by distributing a fake package called "pdf-to-office," which secretly pat…
  continue reading
 
In this revealing episode, Ross Coulthart and Bryce Zabel tackle a wave of breaking developments in the UFO/UAP landscape. They begin with the extraordinary final testimony of Dr. Harold Malmgren, a former U.S. official who, shortly before his death, disclosed direct knowledge of downed non-human craft, recovered biologics, and the controversial ex…
  continue reading
 
Loading …
Listen to this show while you explore
Play