Vulnerabilities newly exploited in the wild. A new cyberespionage campaign. Trends in the C2C marketplace. Hacktivists, other auxiliaries, and the laws of armed conflict.

Vulnerabilities newly exploited in the wild. ...

Up next

Mike Arrowsmith: Facing adversity in the workplace. [CTrO] [Career Notes]

Please enjoy this encore of Career Notes. Mike Arrowsmith, Chief Trust Officer at NinjaOne, leads the organization’s IT, security, and support infrastructure to ensure they meet customers’ security and data privacy demands as it scales. Mike discusses how his career path has led ...  Show more

Stealer in the status bar. [Research Saturday]

Today we have Ziv Mador, VP of Security Research from LevelBlue SpiderLabs discussing their work on "SpiderLabs IDs New Banking Trojan Distributed Through WhatsApp." Researchers at LevelBlue SpiderLabs have identified a new Brazilian banking Trojan dubbed Eternidade Stealer, spre ...  Show more

Recommended Episodes

October Cybersecurity Month in Review: Insider Threats, AI's Role, and Cybercrime Trends
Cybersecurity Today

In this episode of 'Cybersecurity Today: Our Month in Review,' host Jim welcomes a panel including Tammy Harper from Flair, Laura Payne from White Tuque, and David Shipley, CEO of Beauceron Securities. The discussion kicks off with an overview of their plans for Cybersecurity Mon ...  Show more

Hackers Say Thanks For Lousy Security In Large Fast Food Chain
Cybersecurity Today

Cybersecurity Today: Ghost Action Campaign, SalesLoft Breach, AI Vulnerabilities, and Restaurant Security Flaws Host David Shipley discusses the latest in cybersecurity, including the Ghost Action Campaign which compromised over 3000 secrets from GitHub repositories, the SalesLof ...  Show more

The $25M Zoom Call: How Deepfakes Are Rewriting the Rules of Trust, Featuring KnowBe4's Erich Kron
Innovation Heroes

A Hong Kong employee sits through what seems like a routine video call with colleagues and the CFO. Everything looks normal. Then comes the urgent wire transfer request. $25 million later, the horrifying truth emerges: every face on that call was fake, generated by AI.

...

  Show more

10,000 Days in Cybersecurity
Threat Vector by Palo Alto Networks

Cybersecurity has changed dramatically over the past 10,000 days. In this episode of Threat Vector, host David Moulton speaks with Haider Pasha, Chief Security Officer for EMEA & LATAM at Palo Alto Networks, about how the field has evolved and what’s coming next. From his early e ...  Show more