Detecting sandbox emulations. VEC supply chain attacks. Updates from the hybrid war. CISA and NSA offer IAM guidance. Other CISA advisories. Baphomet gets cold feet after all.

Detecting sandbox emulations. VEC supply chai...

Up next

A digital battlefield in practice.

Locked Shields wraps another year. Open models challenge Mythos. CISA tracks FIRESTARTER inside a federal agency. The White House targets foreign AI model extraction. Microsoft lets admins remove Copilot. Treasury sanctions a Cambodian scam-compound senator. Breeze Cache rushes a ...  Show more

Your signal is showing.

Researchers expose covert telecom surveillance campaigns. Lawmakers push new national privacy rules. China-linked actors hide inside compromised device networks. A ransomware forum leak reveals a criminal marketplace. GopherWhisper blends into cloud services for espionage. Attack ...  Show more

Recommended Episodes

CISA Goes Rogue: How Cybersecurity Became Censorship | 2.25.24
Morning Wire

The Cybersecurity and Infrastructure Security Agency faces claims it censors the American public and interferes in elections. After the debunked Russian collusion narrative and the Twitter files, some lawmakers now want to see the agency completely dismantled. Get the facts first ...  Show more

How A Satellite Hack Became a Cybersecurity Wakeup Call
Big Take

People around the world rely on satellites for their internet connections, credit card transactions–and even to keep track of time.  Last year, a suspected Russian-led satellite hack exposed how vulnerable they are to security breaches, from individual hackers seeking to pilfer i ...  Show more

War in Ukraine: the cyber frontier
Business Daily

How the conflict in Ukraine is playing out in cyberspace. With the conflict in Ukraine still raging following Russia’s invasion Ed Butler speaks to hackers from Ukraine including Vlad Styran of Berezha Security Group, one of the people tasked with fending off digital attacks on U ...  Show more

Keeping Security Simple with Johanna Baum, the CEO and Founder of S3 (Strategic Security Solutions)
IT Visionaries

There is a lot of conversation among IT security leaders about engaging the workforce in order to mitigate threats. But how do security professionals actually win people over to their side? Many employees are willing to comply but what can be done to really get through to thos ...

  Show more