PP030: Volt Typhoon On the Attack, Starlink Joins the Navy, and More Security News

PP030: Volt Typhoon On the Attack, Starlink J...

Up next

PP097: How and Why to Turn the Browser into a Universal Security Agent (Sponsored)

With the rise of cloud services and SaaS, the browser has become a primary productivity tool. It’s also a primary vector for malware, phishing, identity theft, data leaks, and other risks. On today’s sponsored episode with Palo Alto Networks, we dive into browser security. We dis ...  Show more

PP096: Taking Note of a Notepad++ Attack; Telnet and NTLM Are Still a Thing?

Everything old is new again in today’s Packet Protector news roundup, as a decade-old Telnet exploit resurfaces, and Microsoft unfolds its roadmap to phase out the ancient NTLM protocol. In other news, Google takes down a sprawling residential proxy network, the popular Notepad++ ...  Show more

Recommended Episodes

New phishing campaigns hit Microsoft 365 and Adobe users. Big Head ransomware. Multichain bridge compromised. CISA adds a KEV. Progress patches MOVEit. Telegram's role in Russia's war.
CyberWire Daily

New phishing campaigns afflict users of Microsoft 365 and Adobe. An analysis of Big Head ransomware. Multichain reports a crypto heist with over $100 million stolen. CISA makes an addition to the Known Exploited Vulnerability Catalog. Progress Software issues additional MOVEit pa ...  Show more

Almost letting hackers rule the web.
CyberWire Daily

A Wordpress plugin vulnerability puts 5 million sites at risk. Google releases an emergency Chrome update addressing an actively exploited vulnerability. Cisco patches multiple vulnerabilities. Researchers say Slack AI is vulnerable to prompt injection. Widely used RFID smart car ...  Show more

Satellite Internet Data Is Discovered To Be Unencrypted And Easy To Intercept
Cybersecurity Today

This episode of Cybersecurity Today, hosted by Jim Love, covers several critical topics in the realm of cybersecurity. Researchers found that unencrypted data from satellites is accessible with cheap equipment, leading to potential eavesdropping on sensitive information worldwide ...  Show more