Weev, Part 1

Weev, Part 1

Up next

Weev, Part 2

The Electronic Frontier Foundation, long time critics of the Computer Fraud and Abuse Act, followed Weev's trial - but did not get involved. For the appeal, however, the organization decided to step it. But althought the EFF had some strong points against the CFAA - the justi ...  Show more

Cuckoo Spear [B-Side]

APT-10 is a Chinese nation-state threat actor that in recent years has been targeting Japanese IT & Instrastructure organizations using a sophisticated backdoor malware known as LODEINFO. Recently, Jin Ito & Loic Castel, researchers from Cybereason's IR Team, uncovered a new tool ...  Show more

Recommended Episodes

320 - Misguided - Matthew Facciani
You Are Not So Smart

What is misinformation? How does it differ from disinformation or just plain ‘ole propaganda? How do we protect ourselves from people with nefarious intentions using all of these things to affect our thoughts, feelings, and behavior? That’s what we discuss in this episode with ...

  Show more

A Hacker Saved The Internet
Stuff They Don't Want You To Know

From a young age, Marcus Hutchins had a preternatural talent for code. As his online renown grew, he found himself at a series of ethical crossroads— and always on the right side of the law. Yet everything changed in 2017, when a US-created weapon went public: he was the only one ...  Show more

Nice to meet you, I'm a scammer.
Hacking Humans

On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware ...  Show more

Elections, influence operations, and hacking. How clever phishing succeeds. Chipotle's point-of-sale breach. Hacking in Fast and Furious 8.
CyberWire Daily

In today's podcast, we follow the story of Fancy Bear (a.k.a. Pawn Storm, a.k.a. APT28) and France's elections. Why clever phishing continues to succeed, and what's up with 0Auth abuse. Information operations distinguished from simple "hacking." Another point-of-sale compromise s ...  Show more