Criminal-on-criminal action in the dark web. The cyber phases of the hybrid war heat up. ICS vulnerabilities. Codespaces and malware servers. Blank-image attacks. Social engineering.

Criminal-on-criminal action in the dark web. ...

Up next

One copy too many.

A critical Linux flaw dubbed “Copy Fail” raises alarm. The House moves to extend Section 702. The White House pushes back on expanded Mythos access. cPanel and SonicWall rush out security patches. Researchers warn AI agents may leak credentials. Smishing targets key industries. U ...  Show more

A wake-up call on frontier AI.

OpenAI and Anthropic brief Congress on cyber-capable AI. The GAO flags improper DOGE access to Treasury payment systems. Greece moves to end online anonymity. CISA orders agencies to patch an exploited Windows zero-day. Researchers uncover ransomware that destroys data instead of ...  Show more

Recommended Episodes

Russie : un malware inédit contre l’Ukraine ?
Choses à Savoir TECH

Si le conflit entre l’Ukraine et la Russie est un drame absolu pour les citoyens, force est de constater que le monde de la tech y joue un rôle de premier plan. Ces derniers jours, nous vous avons présenté différentes actions mises en place par les occidentaux pour tenter d’af ...

  Show more

The War with Algorithms: Why Your Next Security Strategy Includes A.I. and Machine Learning
IT Visionaries

The image of a hooded individual illuminated by the glare of a computer screen hacking into a company’s network is the classic picture of what a cyber attack looks like. The reality, though, is these attackers are almost never a one-man band, but rather a sophisticated team ar ...

  Show more

E992: The Next Unicorns: Expanse CEO & Co-founder Tim Junio reduces exposure to online threats by providing “attack surface visibility”, shares insights into current threats from China & Russia, potential 2020 election tampering, reasons for cybersecurity optimism & more – E8 of 10-ep miniseries
This Week in Startups

0:50 Jason intros Tim Junio
1:44 Tim explains what Expanse does and how "attack surface inventory" is the first step in their cybersecurity platform
5:20 Tim explains the Dyn cyber attack
13:20 How many Fortune 500 companies have been blackmailed via cyber at ...
  Show more

How A Satellite Hack Became a Cybersecurity Wakeup Call
Big Take

People around the world rely on satellites for their internet connections, credit card transactions–and even to keep track of time.  Last year, a suspected Russian-led satellite hack exposed how vulnerable they are to security breaches, from individual hackers seeking to pilfer i ...  Show more