Two sets of China-linked cyberespionage activities. Mirai’s new vectors. A Cozy Bear sighting. Anonymous Sudan gets less anonymous.

Two sets of China-linked cyberespionage activ...

Up next

War hits where it hurts.

Conflict in the Middle East disrupts the circuit board supply chain. The Supreme Court considers arguments on geofence searches. A new report highlights Chinese digital transnational repression. The NCSC protects HDMI and DisplayPort links. Tennessee bans cryptocurrency ATMs. Res ...  Show more

The Three-Layer Strategy for Autonomous Agent Governance with Joe Hladik [Data Security Decoded] and Amit Malik

The race for AI dominance has created a dangerous imbalance between business velocity and cyber resilience. In this episode, host Caleb Tolin is joined by Joe Hladik, Head of Rubrik Zero Labs, and Staff Security Researcher Amit Malik to break down the findings of their latest rep ...  Show more

Recommended Episodes

Russie : un malware inédit contre l’Ukraine ?
Choses à Savoir TECH

Si le conflit entre l’Ukraine et la Russie est un drame absolu pour les citoyens, force est de constater que le monde de la tech y joue un rôle de premier plan. Ces derniers jours, nous vous avons présenté différentes actions mises en place par les occidentaux pour tenter d’af ...

  Show more

Nicole Perlroth, "This Is How They Tell Me the World Ends: The Cyberweapons Arms Race" (Bloomsbury, 2021)
New Books in Technology

For years, cybersecurity experts have debated whether cyber-weapons represent a destabilizing new military technology or merely the newest tool in the spies’ arsenal. In This Is How They Tell Me the World Ends (Bloomsbury, 2021), Nicole Perlroth makes a compelling case that cyber ...  Show more

Cyberguerre: des conflits invisibles aux conséquences bien réelles
Le monde devant soi

Aucun coup n'est tiré, mais les dégâts peuvent être considérables et les conséquences, dramatiques. Souvent silencieuses, parfois spectaculaires, les cyberattaques se multiplient –qu'elles soient le fait de simples criminels, d'États souverains ou d'une collaboration des deux. ...

  Show more

Thu. 03/31 – Hackers Forging Emergency Data Requests
Tech Brew Ride Home

Another day of all the hacking news. Now the hackers are forging Emergency Data Requests. Apparently there have been vulnerabilities in Wyze security cameras that no one bothered to fix. TSMC warns of a tech slowdown. Masa Son orders his lieutenants to slow down investing just a ...  Show more