Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
The FAIK Files explores the mysterious and often wacky intersection of AI, technology, and humanity. From cognitive warfare to digital deception, we examine how AI is reshaping our reality through news, research, and real-world examples. Join us for a thought-provoking journey into a world where anything can be faked, truth is increasingly elusive, and human nature meets artificial intelligence head-on.
…
continue reading
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading
T-Minus Space Daily from N2K CyberWire delivers critical daily intelligence on what powers, protects, and connects the space industry and innovation. N2K CyberWire’s space team makes visible the global connections that facilitate connectivity and commerce through space networks. We cover the news of the day and regularly feature experts covering space’s role in critical infrastructure and national security, space operations and intelligence, data and cybersecurity in space, domestic and inte ...
…
continue reading
Threat Vector is the hit podcast from Palo Alto Networks, with over 1 million downloads and growing. Get inside the minds of top cybersecurity leaders as they break down real threats, smart defenses, and what's coming next. Each episode features insights from industry experts, customers, and Palo Alto Networks teams. It is built for security pros who want to stay ahead.
…
continue reading
"Only Malware in the Building” is a monthly podcast crafted through a collaboration between N2K CyberWire and the Proofpoint DISCARDED podcast. Join hosts Selena Larson, Threat Researcher at Proofpoint, Dave Bittner—host of the CyberWire Daily podcast—and Keith Mularski, former FBI Cyber Division Unit Chief and now Chief Global Officer at Qintel, as this trio of cyber-savvy partners-in-crime team up to uncover the secrets behind some of the most notorious cyberattacks. This segment focuses o ...
…
continue reading
Discover how to secure generative AI beyond the model itself in this episode of Threat Vector. Host David Moulton welcomes Bret Kinsella, GM of Fuel iX and founder of Voicebot.ai and Synthedia. Bret brings deep expertise in enterprise AI and synthetic media. He explores the hidden dangers of shadow AI, where employees use consumer AI tools with sen…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and…
…
continue reading
Today we are joined by Rebecca Krauthamer, Stanford Quantum Computing Researcher and CEO of QuSecure, to discuss the National Quantum Cybersecurity Migration Strategy Act. Ben has the story of a new California bill regulating AI. Dave's got the story of the controversial technology transfer from the US to the UAE. While this show covers legal topi…
…
continue reading
A new self-replicating malware infects the NPM repository. Microsoft and Cloudflare disrupt a Phishing-as-a-Service platform. Researchers uncover a new Fancy Bear backdoor campaign. The VoidProxy phishing-as-a-service (PhaaS) platform targets Microsoft 365 and Google accounts. A British telecom says its ransomware recovery may stretch into November…
…
continue reading

1
In thrust we trust, just not for Cygnus XL today.
16:25
16:25
Play later
Play later
Lists
Like
Liked
16:25Northrop Grumman’s Cygnus XL spacecraft delays docking with the International Space Station (ISS). PLD Space has been selected by the European Space Research and Technology Centre, part of the European Space Agency (ESA), for its first Guidance, Navigation and Control (GNC) contract. The Space Data Association (SDA) has selected GMV to develop its …
…
continue reading
A controversial Trump administration deal gives the U.A.E. access to cutting-edge U.S. AI chips. FlowiseAI warns of a critical account takeover vulnerability. A new social engineering campaign impersonates Meta account suspension notices. A macOS Spotlight 0-day flaw bypasses Apple’s Transparency, Consent, and Control (TCC) protections. Are cost sa…
…
continue reading

1
Exploiting satellites and expanding connectivity.
28:22
28:22
Play later
Play later
Lists
Like
Liked
28:22Redwire has reached an agreement with Thales Alenia Space to become the prime contractor for Skimsat. Redwire and Honeywell to develop new quantum-secured satellite communication systems. Space42 and Viasat intend to form Equatys, a jointly held entity, to enable global Direct-to-Device (D2) services, and more. Remember to leave us a 5-star rating …
…
continue reading
Please enjoy this encore of Word Notes. A cyber threat intelligence analysis model that defines relationship pairs between four core components in the shape of a diamond of adversary playbook activity across the intrusion kill chain: the adversary, their capability, the infrastructure used or attacked, and the victim. CyberWire Glossary link: http…
…
continue reading

1
The return of CISO Perspectives. [CISO Perspectives]
3:21
3:21
Play later
Play later
Lists
Like
Liked
3:21This season on CISO Perspectives—your host, Kim Jones is digging into the issues shaping the future of cybersecurity leadership. From the regulations every CISO needs to understand, to the unexpected places privacy risks are emerging, to the new ways fraud and identity are colliding—these conversations will sharpen your strategies and strengthen yo…
…
continue reading
FBI botnet disruption leaves cybercriminals scrambling to pick up the pieces. Notorious ransomware gangs announce their retirement, but don’t hold your breath. Hacktivists leak data tied to China’s Great Firewall. A new report says DHS mishandled a key program designed to retain cyber talent at CISA. GPUGate malware cleverly evades analysis. WhiteC…
…
continue reading

1
At the Apex of spacecraft manufacturing expansion.
31:02
31:02
Play later
Play later
Lists
Like
Liked
31:02Spacecraft manufacturer Apex has closed a $200 million Series D funding round. European aerospace groups Leonardo, Thales, and Airbus are reportedly looking to sign an initial agreement to combine their satellite businesses as early as this year. SES and Cailabs are partnering to test laser communication technology, and more. Remember to leave us a…
…
continue reading

1
Helen Patton: A platform to talk about security. [CISO] [Career Notes]
10:45
10:45
Play later
Play later
Lists
Like
Liked
10:45Please enjoy this encore of Career Notes. Advisory CISO at Cisco, Helen Patton, shares that a combination of dumb luck, hard work and serendipity that got her to where she is today. Growing up in the country in Australia, Helen notes that computers were not really a thing. She happened into technology after moving to the US, as she was the only per…
…
continue reading

1
Data leak without a click. [Research Saturday]
22:02
22:02
Play later
Play later
Lists
Like
Liked
22:02Today we are joined by Amanda Rousseau, Principal AI Security Researcher from Straiker, discussing their work on "The Silent Exfiltration: Zero‑Click Agentic AI Hack That Can Leak Your Google Drive with One Email." Straiker’s research found that enterprise AI agents can be silently manipulated to leak sensitive data, even without user clicks or ale…
…
continue reading

1
Identifying vulnerabilities in space with Bigbear.ai.
21:22
21:22
Play later
Play later
Lists
Like
Liked
21:22BigBear.ai is at the forefront of innovation for national security, and is committed to supporting the critical infrastructure driving America’s competitive edge. The company deploys cutting-edge Al, machine learning, and computer vision solutions to defend critical operations and win with decision advantage. Our guests are Eric Conway, Vice Presid…
…
continue reading
Samsung patches a critical Android zero-day vulnerability. Microsoft resolves a global Exchange Online outage. CISA reaffirms its commitment to the CVE program. California passes a bill requiring web browsers to let users automatically send opt-out signals. Apple issues spyware attack warnings. The FTC opens an investigation into AI chatbots on how…
…
continue reading

1
ESA pushes for space, defense, and cybersecurity autonomy.
24:11
24:11
Play later
Play later
Lists
Like
Liked
24:11The European Space Agency’s (ESA’s) Director General (DG) Josef Aschbacher delivered the opening remarks at the ‘General Assembly Defence, Space and Cybersecurity’. Satlink is partnering with Rivada Space Networks to provide a network with the necessary security and performance to support Spanish enterprises and Defense Forces. Armada AI and Sophia…
…
continue reading

1
From the Vault: Deepfakes and the Spectrum of Digital Deception
45:22
45:22
Play later
Play later
Lists
Like
Liked
45:22Hey folks! This week we're recovering from a few technical difficulties, so we're bringing you one from the vault. This is from the thing that started it all -- the miniseries based on my book, FAIK. This episode covers chapter 6: Deepfakes and the Spectrum of Digital Deception. Get the Book (Amazon Associate Link): FAIK: A Practical Guide to Livi…
…
continue reading
The House passes a defense policy bill that includes new provisions on cybersecurity and artificial intelligence. Senator Wyden accuses Microsoft of “gross cybersecurity negligence” after a 2024 ransomware attack crippled healthcare giant Ascension. The White House shelves plans to split U.S. Cyber Command and the NSA. The Pentagon finalizes its lo…
…
continue reading
Scientists publish new findings that say they have found the strongest evidence yet of ancient life on Mars. Rendezvous Robotics has emerged from stealth and announced the closing of a $3 million pre-seed funding round. Blue Origin’s Blue Alchemist has successfully completed its Critical Design Review (CDR), and more. Remember to leave us a 5-star …
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal …
…
continue reading
This week on Caveat, Dave and Ben welcome back N2K’s own Ethan Cook for our latest policy deep dive segment. As our lead analyst, Ethan shares his knowledge of law, privacy, and surveillance on the latest policy developments shaping the cybersecurity and legal landscape. While this show covers legal topics, and Ben is a lawyer, the views ex…
…
continue reading
Patch Tuesday. A data leak sheds light on North Korean APT Kimsuky. Apple introduces Memory Integrity Enforcement. Ransomware payments have dropped sharply in the education sector in 2025. A top NCS official warns ICS security lags behind, and a senator calls U.S. cybersecurity a “hellscape”. A Ukrainian national faces federal charges and an $11 mi…
…
continue reading