Disentangling cybercrime from cyberespionage. A threat to the IoT supply chain. What do you do with the hacktivists when they stop being hacktivists? A retired FBI Special Agent is indicted.

Disentangling cybercrime from cyberespionage....

Up next

Signals, scams, and a Salesforce snatch.

Russian hackers target Signal and WhatsApp. Permit scammers impersonate local officials. Anthropic sues over a Pentagon blacklist. The White House moves to restore fraud victims. ShinyHunters target Salesforce data. Ericsson reports a breach. macOS users face ClickFix malware. AW ...  Show more

What role does higher education play in cyber? [CISOP]

Show Notes: Cybersecurity has continued to grow and mature as a field over the past decade which has given rise to numerous degree pathways across dozens of collegiate institutions; however, the value of these degrees has continued to be a topic of debate. In this episode of CISO ...  Show more

Recommended Episodes

NSO Employee Abused Phone Hacking Tech to Target a Love Interest
CYBER

Back in 2013, between the many revelations on mass surveillance abuses by the NSA coming from the trove of Snowden leaks, Americans also learned agents at the signals intelligence agency were snooping on their love interests. Dubbed LOVEINT (a play on ‘Love-Intelligence,’ apparen ...  Show more

E992: The Next Unicorns: Expanse CEO & Co-founder Tim Junio reduces exposure to online threats by providing “attack surface visibility”, shares insights into current threats from China & Russia, potential 2020 election tampering, reasons for cybersecurity optimism & more – E8 of 10-ep miniseries
This Week in Startups

0:50 Jason intros Tim Junio
1:44 Tim explains what Expanse does and how "attack surface inventory" is the first step in their cybersecurity platform
5:20 Tim explains the Dyn cyber attack
13:20 How many Fortune 500 companies have been blackmailed via cyber at ...
  Show more

How the FBI Ran Its Own Texting App to Catch Criminals
CYBER

It’s basically the FBI’s greatest fantasy come to life: Owning an operating an encrypted communications company exclusively used by some of the world’s most hardened and organized criminals. “Anom” the subscription based network operated by the feds, was used as the ultimate spy ...  Show more