A cyberespionage operation of unclear provenance shifts its targets. Cyberattacks on voting in Ecuador. Other notes from the cyber underworld. And doxing the Duma.

A cyberespionage operation of unclear provena...

Up next

Langflow locked and loaded.

CISA warns of actively exploited Langflow vulnerability. CISA flags critical PTC Windchill vulnerability. Phishing activity surges amid war in Iran. Google moves up their post-quantum timeline. Alleged RedLine infostealer developer faces thirty years in a US prison. Bearlyfy hack ...  Show more

Why is the vendor role so contentious in the cyber ecosystem? [CISOP]

As the emphasis on improving cybersecurity has continued to grow, so has the number of vendors offering a range of cybersecurity services. However, despite the value many of these vendors bring, the relationship between vendors and clients has become strained. In this episode, Ki ...  Show more

Recommended Episodes

Cyberguerre: des conflits invisibles aux conséquences bien réelles
Le monde devant soi

Aucun coup n'est tiré, mais les dégâts peuvent être considérables et les conséquences, dramatiques. Souvent silencieuses, parfois spectaculaires, les cyberattaques se multiplient –qu'elles soient le fait de simples criminels, d'États souverains ou d'une collaboration des deux. ...

  Show more

The Cyber Front in the War on Ukraine
CYBER

There are a lot of companies out there willing to sell shady customers the tools they need to spy on just about anyone. All over the world software vendors like Hacking Team and NSO Group will help you break into a cellphone or read an email you’re not supposed to. But that might ...  Show more