The Zombies Are Attacking

The Zombies Are Attacking

Up next

Did Anthropic Have the Best Week in Tech?

The Week in Tech is back and it’s growing. Starting this Friday, Oz will be joined by a panel of the brightest minds covering Silicon Valley. Each week, they will discuss the latest news, decode emerging trends and debate what actually matters for the future of technology and for ...  Show more

What Do EMDR, Tony Robbins, and NXIVM Have in Common? NLP - The Story

This week, we're talking 'human technology' — specifically, neuro-linguistic programming, or NLP. If you have any interest in modern day cults like NXIVM or Twin Flames Universe, you may have heard of it. But did you know that NLP also has roots in therapeutic practices like Eye ...  Show more

Recommended Episodes

Daily: Ransomware & DDoS combining. Malicious USB chargers. Cyber ops aren't 'bombs?
CyberWire Daily

In today's podcast, we hear about the current state of ransomware, why criminals like it, and what can be done about it. Keyloggers are being distributed by malicious USB charging devices. Blue Coat may be headed for an IPO. US cyber operations have been called "cyber bombs," but ...  Show more

The War with Algorithms: Why Your Next Security Strategy Includes A.I. and Machine Learning
IT Visionaries

The image of a hooded individual illuminated by the glare of a computer screen hacking into a company’s network is the classic picture of what a cyber attack looks like. The reality, though, is these attackers are almost never a one-man band, but rather a sophisticated team ar ...

  Show more

CISA's new Binding Operational Directive. “CosmicEnergy” tool doesn’t pose a cosmic threat. Hackers’ homage to fromage in attacks against the Swiss government. Industry advice for the White House.
CyberWire Daily

CISA issues a new Binding Operational Directive. An update on CosmicEnergy. Hackers’ homage to fromage in attacks against the Swiss government. Ukraine's Cyber Police shut down a pro-Russian bot farm. Clothing and footwear retailers see impersonation and online fraud. A 2021 rans ...  Show more

TA444 and crypto theft on behalf of the Dear Successor. CryptoAPI spoofing vulnerability described. New Python-based malware campaign. User headspace. Tanks vs. hacktivists.
CyberWire Daily

How do the North Koreans get away with it? They do run their cyber ops like a creepy start-up business. A spoofing vulnerability is discovered in Windows CryptoAPI. Python-based malware is distributed via phishing. MacOS may have a reputation for threat-resistance, but users shou ...  Show more