Known Exploited Vulnerabilities. Fool’s gold. Hacktivists come in both dissident and loyal varieties. Naming and shaming the shameless.

Known Exploited Vulnerabilities. Fool’s gold....

Up next

Are we a trade or a profession? [CISO Perspectives]

Please enjoy this encore of CISO Perspectives. We're sharing a episode from another N2K show we thought you might like. It's the second episode of the new season of the show CISO Perspectives with Kim Jones. Enjoy! Show Notes: Cybersecurity has an identity problem where the indus ...  Show more

Investing in the security tech market with NightDragon. [T-Minus Space Daily Special Edition]

While our team is away from the mic observing the Martin Luther King, Jr. holiday in the United States, we share this thoughtful discussion from our T-Minus Space Daily team. Signals Intelligence (SIGINT) is the practice of intercepting and analyzing electronic signals, like phon ...  Show more

Recommended Episodes

How A Satellite Hack Became a Cybersecurity Wakeup Call
Big Take

People around the world rely on satellites for their internet connections, credit card transactions–and even to keep track of time.  Last year, a suspected Russian-led satellite hack exposed how vulnerable they are to security breaches, from individual hackers seeking to pilfer i ...  Show more

A hacking group called Hive has been hacked by the US authorities
World Business Report

The hackers have been hacked - a prolific international ransomware operation has been shut down by US, German and Dutch officials. The criminal network, Hive, is said to have targeted over 1,500 victims worldwide in the past 18 months and extorted over $100 million. FBI director ...  Show more

Crypto hacker hijinks, government spyware, and Utah social media shocker
Smashing Security

A cryptocurrency hack leads us down a maze of twisty little passages, Joe Biden's commercial spyware bill, and Utah gets tough on social media sites.All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Gra ...  Show more

Lauri Love: The realities of cyber security
The Interview

Stephen Sackur speaks to the accused computer hacker Lauri Love. For nations, corporations and all of us as individuals, the age of the internet has heightened vulnerability. Information and data - the most valuable of all commodities - are at risk from hackers, motivated by gree ...  Show more