A look back at Black Hat and Def Con. Sometimes failures that look like accidents are accidents. Russia wants better content suppression from Google. Notes on intelligence services.

A look back at Black Hat and Def Con. Sometim...

Up next

One copy too many.

A critical Linux flaw dubbed “Copy Fail” raises alarm. The House moves to extend Section 702. The White House pushes back on expanded Mythos access. cPanel and SonicWall rush out security patches. Researchers warn AI agents may leak credentials. Smishing targets key industries. U ...  Show more

A wake-up call on frontier AI.

OpenAI and Anthropic brief Congress on cyber-capable AI. The GAO flags improper DOGE access to Treasury payment systems. Greece moves to end online anonymity. CISA orders agencies to patch an exploited Windows zero-day. Researchers uncover ransomware that destroys data instead of ...  Show more

Recommended Episodes

The Story Behind The SolarWinds Cyberattack
Consider This from NPR

Last year, hackers believed to be directed by the Russian intelligence service, the SVR, slipped a malicious code into a routine software update from a Texas- based company called SolarWinds. They then used it as a vehicle for a massive cyberattack against America and successfull ...  Show more

Судя по всему, Роскомнадзор прямо сейчас репетирует блокировку YouTube. Когда и по какому сценарию это произойдет? И как можно будет обойти запрет?
Что случилось

4 сентября в России произошел сбой в работе видеохостинга YouTube.

По <a href="https://downradar.ru/ne-rab ...

  Show more

Asaf Lubin on Cyber Espionage and International Law
The Lawfare Podcast

On June 16, the U.S. State Department discovered unauthorized access to its Exchange Online email services and reported it to Microsoft. Almost a month later, on July 11, Microsoft disclosed the attack, and attributed it to a China-based threat actor, which they call Storm-055 ...

  Show more

Cyberguerre: des conflits invisibles aux conséquences bien réelles
Le monde devant soi

Aucun coup n'est tiré, mais les dégâts peuvent être considérables et les conséquences, dramatiques. Souvent silencieuses, parfois spectaculaires, les cyberattaques se multiplient –qu'elles soient le fait de simples criminels, d'États souverains ou d'une collaboration des deux. ...

  Show more