Secure Your Summer: Top Cyber Myths, Busted [Threat Vector]

Secure Your Summer: Top Cyber Myths, Busted [...

Up next

The M5 just met its memory problem.

Researchers crack Apple’s M5 memory protections with a kernel exploit. An IBM Security executive emerges as a possible CISA pick. Researchers uncover four malicious npm packages. AI-generated “slop” floods bug bounty programs. Major healthcare breaches hit the HHS tracker, 7-Elev ...  Show more

From cyberspace to space-cyber. [T-Minus: Space-Cyber Briefing]

For years, in-space internet capabilities were rarely worth the hassle. Now, that’s changing. In today’s episode, Maria Varmazis and Ethan Cook sit down to discuss how internet data moves through space systems and its recent advancements. For decades, GEO satellites made up most ...  Show more

Recommended Episodes

Critical infrastructure: Pending legislation and risks and rewards from AI.
Control Loop: The OT Cybersecurity Podcast

Mandiant ties OT attacks to Sandworm. Russia-linked hackers target Texas water utilities. Belarusian hacktivists hit fertilizer company. CISA issues eight ICS advisories. Dave Bittner's Caveat podcast co host Ben Yelin joins him to discuss pending legislation with potential to af ...  Show more

10,000 Days in Cybersecurity
Threat Vector by Palo Alto Networks

Cybersecurity has changed dramatically over the past 10,000 days. In this episode of Threat Vector, host David Moulton speaks with Haider Pasha, Chief Security Officer for EMEA & LATAM at Palo Alto Networks, about how the field has evolved and what’s coming next. From his early e ...  Show more

City Jerks, AI animals, and is the BBC hacking again?
Smashing Security

Two unsavoury websites suffer from a worrying leak, scientists are going animal crackers over AI, and the BBC is intercepting scammers' live phone calls with victims.All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer secu ...  Show more