Agent Tesla still hits unpatched systems. Hot wallet hacks. AI and DevSecOps. Notes on Fancy Bear and NoName057(16). And some curious trends in the cyber labor market.

Agent Tesla still hits unpatched systems. Hot...

Up next

From cyberspace to space-cyber. [T-Minus: Space-Cyber Briefing]

For years, in-space internet capabilities were rarely worth the hassle. Now, that’s changing. In today’s episode, Maria Varmazis and Ethan Cook sit down to discuss how internet data moves through space systems and its recent advancements. For decades, GEO satellites made up most ...  Show more

Scam papers served. [Research Saturday]

⁠⁠⁠Thomas Elkins⁠⁠⁠, SOC L3 Analyst from ⁠⁠⁠BlueVoyant⁠⁠⁠, is discussing "Unpacking Augmented Marauder’s Multi-Pronged Casbaneiro Campaigns." BlueVoyant researchers uncovered a large-scale phishing campaign by a Brazil-linked threat group targeting Spanish-speaking users across L ...  Show more

Recommended Episodes

AI Threats & Opportunities in Cyber Security With Material Security Co-Founder Ryan Noon
No Priors: Artificial Intelligence | Technology | Startups

Cyber Security is going to change significantly in the era of AI, according to Ryan Noon, cofounder of Material Security, a security company that makes cloud-based Google and Microsoft email a safe place for sensitive data. Elad Gil and Ryan talk about how Material Security start ...  Show more

Analyzing the Impact of A.I. and Technology on Society and Cybersecurity
IT Visionaries

Technology is advancing at pace never seen before and the newest tech, applications and widgets are being widely adopted at an even quicker rate. 

Just look at A.I. and machine learning tools,which are now used to identify things once thought unimaginable — whether it's ...

  Show more

Thu. 03/31 – Hackers Forging Emergency Data Requests
Tech Brew Ride Home

Another day of all the hacking news. Now the hackers are forging Emergency Data Requests. Apparently there have been vulnerabilities in Wyze security cameras that no one bothered to fix. TSMC warns of a tech slowdown. Masa Son orders his lieutenants to slow down investing just a ...  Show more

The War with Algorithms: Why Your Next Security Strategy Includes A.I. and Machine Learning
IT Visionaries

The image of a hooded individual illuminated by the glare of a computer screen hacking into a company’s network is the classic picture of what a cyber attack looks like. The reality, though, is these attackers are almost never a one-man band, but rather a sophisticated team ar ...

  Show more