Agent Tesla still hits unpatched systems. Hot wallet hacks. AI and DevSecOps. Notes on Fancy Bear and NoName057(16). And some curious trends in the cyber labor market.

Agent Tesla still hits unpatched systems. Hot...

Up next

One copy too many.

A critical Linux flaw dubbed “Copy Fail” raises alarm. The House moves to extend Section 702. The White House pushes back on expanded Mythos access. cPanel and SonicWall rush out security patches. Researchers warn AI agents may leak credentials. Smishing targets key industries. U ...  Show more

A wake-up call on frontier AI.

OpenAI and Anthropic brief Congress on cyber-capable AI. The GAO flags improper DOGE access to Treasury payment systems. Greece moves to end online anonymity. CISA orders agencies to patch an exploited Windows zero-day. Researchers uncover ransomware that destroys data instead of ...  Show more

Recommended Episodes

AI Threats & Opportunities in Cyber Security With Material Security Co-Founder Ryan Noon
No Priors: Artificial Intelligence | Technology | Startups

Cyber Security is going to change significantly in the era of AI, according to Ryan Noon, cofounder of Material Security, a security company that makes cloud-based Google and Microsoft email a safe place for sensitive data. Elad Gil and Ryan talk about how Material Security start ...  Show more

Analyzing the Impact of A.I. and Technology on Society and Cybersecurity
IT Visionaries

Technology is advancing at pace never seen before and the newest tech, applications and widgets are being widely adopted at an even quicker rate. 

Just look at A.I. and machine learning tools,which are now used to identify things once thought unimaginable — whether it's ...

  Show more

Thu. 03/31 – Hackers Forging Emergency Data Requests
Tech Brew Ride Home

Another day of all the hacking news. Now the hackers are forging Emergency Data Requests. Apparently there have been vulnerabilities in Wyze security cameras that no one bothered to fix. TSMC warns of a tech slowdown. Masa Son orders his lieutenants to slow down investing just a ...  Show more

The War with Algorithms: Why Your Next Security Strategy Includes A.I. and Machine Learning
IT Visionaries

The image of a hooded individual illuminated by the glare of a computer screen hacking into a company’s network is the classic picture of what a cyber attack looks like. The reality, though, is these attackers are almost never a one-man band, but rather a sophisticated team ar ...

  Show more