More on that Solorigate threat actor, especially its non-SolarWinds activity. Chimera’s new target list. Executive Order on reducing IaaS exploitation. The case of the stolen laptop.

More on that Solorigate threat actor, especia...

Up next

Ghosted by Grafana [Research Saturday]

Today we are joined by ⁠Sasi Levi⁠, Security Research Lead at ⁠Noma Security⁠, sharing their team's work on "GrafanaGhost: The Phantom Stealing Your Data." Researchers at Noma Security disclosed “GrafanaGhost,” a vulnerability that could allow attackers to silently exfiltrate sen ...  Show more

Too many cooks in the algorithm.

Trump hits pause on an AI executive order. Lawmakers sound alarms over CISA cuts. A sophisticated scareware campaign traps users in fake tech support scams. Ubiquiti patches critical UniFi flaws. The U.S. pours billions into quantum computing. Researchers uncover delayed Google A ...  Show more

Recommended Episodes

Thu. 03/31 – Hackers Forging Emergency Data Requests
Tech Brew Ride Home

Another day of all the hacking news. Now the hackers are forging Emergency Data Requests. Apparently there have been vulnerabilities in Wyze security cameras that no one bothered to fix. TSMC warns of a tech slowdown. Masa Son orders his lieutenants to slow down investing just a ...  Show more

AI Threats & Opportunities in Cyber Security With Material Security Co-Founder Ryan Noon
No Priors: Artificial Intelligence | Technology | Startups

Cyber Security is going to change significantly in the era of AI, according to Ryan Noon, cofounder of Material Security, a security company that makes cloud-based Google and Microsoft email a safe place for sensitive data. Elad Gil and Ryan talk about how Material Security start ...  Show more

Security Straight Talk with Jim Alkove, Chief Trust Officer at Salesforce, and George Kurtz, President/CEO and co-founder of CrowdStrike
IT Visionaries

When it comes to IT security, there are a lot of marketing pitches out there offering bullish assessments of certain technologies, and, of course, the particular products being pitched. Really, there’s nothing wrong with marketers doing their jobs, and it’s especially useful w ...

  Show more

Wed. 03/10 – Now The Hackers Are In The Security Cams
Tech Brew Ride Home

Hackers breached the security cameras used by everybody from prisons and hospitals to Tesla factories. Why you will no longer “subscribe” to this podcast, but will “follow” it. Why T-Mobile is signing everyone up to have their usage data tracked by advertisers. And Facebook’s 10 ...  Show more