The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
A fun and informative cybersecurity audio glossary from N2K.
…
continue reading
The daily space intelligence and analysis that global space industry leaders and experts depend on. Published each weekday, this program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world. Visit us to learn more at https://space.n2k.com/
…
continue reading
Every Saturday, we sit down with cybersecurity researchers to talk shop about the latest threats, vulnerabilities, and technical discoveries.
…
continue reading
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading
Step inside the diverse and fascinating worlds of cybersecurity professionals around the globe and hear their personal stories in their own words.
…
continue reading
CISO Perspectives explores the evolving landscape of cybersecurity leadership, talent, and risk—because success in cybersecurity is about people, not just technology. Hosted by Kim Jones, veteran CISO and educator, this podcast challenges conventional thinking on leadership, talent pipelines, and the disconnects holding the profession back. Join Kim for candid discussions with industry leaders, and insights that help you build a stronger, more resilient cyber ecosystem.
…
continue reading
"Only Malware in the Building” is a monthly podcast crafted through a collaboration between N2K CyberWire and the Proofpoint DISCARDED podcast. Join hosts Selena Larson, Threat Researcher at Proofpoint, Dave Bittner—host of the CyberWire Daily podcast—and Keith Mularski, former FBI Cyber Division Unit Chief and now Chief Global Officer at Qintel, as this trio of cyber-savvy partners-in-crime team up to uncover the secrets behind some of the most notorious cyberattacks. This segment focuses o ...
…
continue reading
Get ready for a deep dive into what cybersecurity professionals often refer to as the "8th Layer" of security: HUMANS. Welcome to 8th Layer Insights (8Li). This podcast is a multidisciplinary exploration into how the complexities of human nature affect security and risk. Author, security researcher, and behavior science enthusiast Perry Carpenter taps experts for their insights and illumination. Topics include cybersecurity, psychology, behavior science, communication, leadership, and more.
…
continue reading
Readings from the dark underworld of cybercrime and espionage, recalled to life, reinterpreted, and reimagined for the benefit of the infosec literati. Oh, and it’s also just play and parody from the ever-restless imaginations of the N2K editorial team.
…
continue reading
Flash cybersecurity advisories from the US Government. These alerts provide timely technical and operational information, indicators of compromise, and mitigations for current major security threats, vulnerabilities, and exploits. These alerts have been edited and adapted for audio by N2K Networks as a public service.
…
continue reading
Control Loop is the OT Cybersecurity Podcast, your terminal for ICS security, intelligence, and learning. Every two weeks, we bring you the latest news, strategies, and technologies that industry professionals rely on to safeguard civilization.
…
continue reading
An occasional series from the team at the Hacking Humans podcast. N2K's Dave Bittner and co-host from the Johns Hopkins University Information Security Institute, Joe Carrigan, are joined by the N2K's Chief Security Officer and Chief analyst, Rick Howard. The team watches clips from some of their favorite movies, clips which demonstrate examples of the social engineering scams and schemes they talk about on Hacking Humans.
…
continue reading

1
Cognitive Heist series #4: The Ghost - Panic, Urgency, and the Speed of Deception
12:09
12:09
Play later
Play later
Lists
Like
Liked
12:09👻 New Deceptive Minds issue: Cognitive Heist series issue #4 -- The Ghost The ghost doesn’t break in. It doesn’t even exist. It just panics you into acting-- fast, unthinking, exposed. This issue explores one of the most dangerous tools in a scammer’s toolkit: urgency. We unpack: 🧠 The psychology of panic and why urgency shuts down critical thinkin…
…
continue reading

1
Hannah Kenney: Focused on people. [Risk] [Career Notes]
8:16
8:16
Play later
Play later
Lists
Like
Liked
8:16Please enjoy this encore of Career Notes. Manager in BARR Advisory's Cyber Risk Advisory Practice, Hannah Kenney, shares her journey from never considering technology as a career to having it click in an informations systems class in college. After noticing she was the only one in the room who enjoyed the lecture, Hannah knew she wanted to go down …
…
continue reading
Please enjoy this encore of Career Notes. Manager in BARR Advisory's Cyber Risk Advisory Practice, Hannah Kenney, shares her journey from never considering technology as a career to having it click in an informations systems class in college. After noticing she was the only one in the room who enjoyed the lecture, Hannah knew she wanted to go down …
…
continue reading

1
nOAuth-ing to see here. [Research Saturday]
23:59
23:59
Play later
Play later
Lists
Like
Liked
23:59This week, we are joined by Eric Woodruff, Chief Identity Architect at Semperis, discussing "nOAuth Abuse Alert: Full Account Takeover of Entra Cross-Tenant SaaS Applications". Semperis researchers identified a critical authentication flaw known as nOAuth in 9 out of 104 tested SaaS applications integrated with Microsoft Entra ID. This low-complexi…
…
continue reading

1
Flight and the future with Astronaut Wendy Lawrence.
26:22
26:22
Play later
Play later
Lists
Like
Liked
26:22Wendy Lawrence (Captain, US Navy, Retired) is an engineer, pilot (helicopter), and a former NASA Astronaut. She flew on four space shuttle missions, and is now using her experience to inspire the next generation of the space workforce. She tells us about her work with the Challenger Learning Center and Higher Orbits. You can connect with Wendy on L…
…
continue reading
This week, we are joined by Eric Woodruff, Chief Identity Architect at Semperis, discussing "nOAuth Abuse Alert: Full Account Takeover of Entra Cross-Tenant SaaS Applications". Semperis researchers identified a critical authentication flaw known as nOAuth in 9 out of 104 tested SaaS applications integrated with Microsoft Entra ID. This low-complexi…
…
continue reading
NASA SpaceX Crew 11 are heading to the International Space Station (ISS). Echostar has selected MDA Space as the prime contractor for a direct-to-device (D2D) satellite constellation. ispace has entered into an agreement with Bridgestone Corporation to advance the application of their tires for lunar rovers, and more. Remember to leave us a 5-star …
…
continue reading
A critical vulnerability in SUSE [SOO-suh] Manager allows attackers to run commands with root privilege. A joint CISA and U.S. Coast Guard threat hunt at a critical infrastructure site reveals serious cybersecurity issues. Healthcare providers across the U.S. report recent data breaches. Cybercriminals infiltrate a bank by physically planting a Ras…
…
continue reading
A sweeping malware campaign by North Korea’s Lazarus Group targets open source ecosystems. President Trump announces a new electronic health records system. A new report reveals deep ties between Chinese state-sponsored hackers and Chinese tech companies. Researchers describe a new prompt injection threat targeting LLMs via browser extensions. Palo…
…
continue reading

1
Weather scrubs the launch of SpaceX Crew 11.
26:45
26:45
Play later
Play later
Lists
Like
Liked
26:45NASA’s SpaceX Crew 11 launch to the International Space Station (ISS) scrubbed due to weather conditions. Intuitive Machines has secured a $9.8 million Phase Two government contract to advance its Orbital Transfer Vehicle (OTV) through Critical Design Review. Deloitte has unveiled a new system to detect cyber intrusions and anomalies on satellites,…
…
continue reading
In this special episode of Hacking Humans, while Joe and Maria take a well-earned summer break, we’re joined by a special guest host: Rob Allen, Chief Product Officer at ThreatLocker. Rob dives into the tactics and profile of the cybercriminal group known as Scattered Spider—a crew that’s gained notoriety for its cunning use of social engineering o…
…
continue reading
While Ben is on vacation this week, Dave welcomes back Ethan Cook to the show. On today’s episode, Ethan breaks down former President Trump’s recently released AI action plan, highlighting key priorities and what it could mean for the future of U.S. tech policy. Dave takes a closer look at the growing bipartisan support for AI regulation in Congres…
…
continue reading
Officials in St. Paul, Minnesota declare a state of emergency following a cyberattack. Hackers disrupt a major French telecom. A power outage causes widespread service disruptions for cloud provider Linode. Researchers reveal a critical authentication bypass flaw in an AI-driven app development platform. A new study shows AI training data is chock …
…
continue reading

1
Firefly selected for another NASA CLPS contract.
17:04
17:04
Play later
Play later
Lists
Like
Liked
17:04Firefly Aerospace has been awarded a $176.7 million NASA Commercial Lunar Payload Services (CLPS) contract to deliver five NASA-sponsored payloads to the Moon’s south pole in 2029. The US Space Systems Command (SSC) has awarded $37.5 million to five companies for Protected Tactical Satellite Communications. The NASA- ISRO Synthetic Aperture Radar (…
…
continue reading
Things get worse in the Tea dating app breach. CISA adds three vulnerabilities to its Known Exploited Vulnerabilities catalog. Researchers uncover a critical flaw in Google’s AI coding assistant. A Missouri Health System agrees to a $9.25 million settlement over claims it used web tracking tools. “Sploitlight” could let attackers bypass Apple’s TCC…
…
continue reading

1
X37-B Spaceplane is scheduled for its eighth mission.
27:12
27:12
Play later
Play later
Lists
Like
Liked
27:12The US Space Force’s (USSF’s) X37-B spaceplane is scheduled to lift off for its eighth mission on August 21. Firefly Aerospace is targeting a valuation of about $5.5 billion in its US initial public offering. Boeing’s Defense, Space and Security Division reported $6.6 billion in revenue for Q2, and more. Remember to leave us a 5-star rating and rev…
…
continue reading
Please enjoy this encore of Word Notes. A condition announced by the US Cybersecurity and Infrastructure Security Agency (CISA) to draw attention to a temporary period of high alert, associated with expectation of a connected wave of cyberattacks prompted by either a widespread vulnerability or an unusually active and capable threat actor. CyberWir…
…
continue reading
Please enjoy this encore of Word Notes. A condition announced by the US Cybersecurity and Infrastructure Security Agency (CISA) to draw attention to a temporary period of high alert, associated with expectation of a connected wave of cyberattacks prompted by either a widespread vulnerability or an unusually active and capable threat actor. CyberWir…
…
continue reading
Russia’s flagship airline suffers a major cyberattack. U.S. insurance giant Allianz Life confirms the compromise of personal data belonging to most of its 1.4 million customers. A women’s dating safety app spills the tea. NASCAR confirms a data breach. Researchers believe the newly emerged Chaos ransomware group may be a rebrand of BlackSuit. Over …
…
continue reading
Arianespace launched the VV27 mission from Europe’s Spaceport in French Guiana. Thales Alenia Space has signed a contract with the Italian Space Agency to carry out the preliminary design phase of a multipurpose habitation module for the lunar surface. The Australian Government invested $5 million in Gilmour Space to accelerate the development of E…
…
continue reading

1
Ryan Kovar: Everyday, assume compromise. [Strategy] [Career Notes]
9:14
9:14
Play later
Play later
Lists
Like
Liked
9:14Please enjoy this encore of Career Notes. Distinguished Security Strategist at Splunk, Ryan Kovar, shares his journey that started in the US Navy and how it contributed to his leadership in life after the military. Cutting his teeth as sysadmin on the USS Kitty Hawk, Ryan worked as a contractor following the Navy. At Splunk, he leads the SURGe rese…
…
continue reading

1
Ryan Kovar: Everyday, assume compromise. [Strategy]
9:14
9:14
Play later
Play later
Lists
Like
Liked
9:14Please enjoy this encore of Career Notes. Distinguished Security Strategist at Splunk, Ryan Kovar, shares his journey that started in the US Navy and how it contributed to his leadership in life after the military. Cutting his teeth as sysadmin on the USS Kitty Hawk, Ryan worked as a contractor following the Navy. At Splunk, he leads the SURGe rese…
…
continue reading
Etlaq Spaceport is Oman’s first commercial spaceport, strategically located at 18° latitude to maximize launch efficiency. Its equatorial positioning provides a performance advantage, reducing fuel consumption and optimizing satellite deployment to Low Earth Orbit (LEO) and beyond. We find out more from Chief Commercial Officer, Julanda Al-Riyami. …
…
continue reading

1
Muddled Libra: From Spraying to Preying in 2025 [Threat Vector]
36:11
36:11
Play later
Play later
Lists
Like
Liked
36:11Please enjoy this Special Edition episode of the Threat Vector podcast with an update on our previous Muddled Libra coverage. Muddled Libra is back and more dangerous than ever. In this episode of Threat Vector, David Moulton speaks with Sam Rubin and Kristopher Russo from Unit 42 about the resurgence of the threat group also known as Scattered Spi…
…
continue reading

1
Muddled Libra: From Spraying to Preying in 2025 [Threat Vector]
36:11
36:11
Play later
Play later
Lists
Like
Liked
36:11Please enjoy this Special Edition episode of the Threat Vector podcast with an update on our previous Muddled Libra coverage. Muddled Libra is back and more dangerous than ever. In this episode of Threat Vector, David Moulton speaks with Sam Rubin and Kristopher Russo from Unit 42 about the resurgence of the threat group also known as Scattered Spi…
…
continue reading