News
Security architect, podcast host, and author Evgeniy Kharam has seen it again and again: a company buys a shiny new security product, and a year later, it’s still sitting on the shelf. Not because it ...
This week, we're sharing our interview with Winn Schwartau! Winn Schwartau is a respected authority in information security and one of the earliest voices to warn about the risks of cyberwarfare.
This week, Ben discusses some major Supreme Court decisions from the just concluded 2025 term. Dave's got the story of a license plate reader company dialing back access after media reports reveal ...
On this week's episode of The Microsoft Threat Intelligence Podcast, Sherrod DeGrippo is joined by two of MSTIC’s finest analysts. They discuss recent trends in financially motivated cyber threats ...
Researchers release proof-of-concept exploits for CitrixBleed2. Grafana patches four high-severity vulnerabilities. A hacker claims to have breached Spanish telecom giant Telefónica. Italian police ...
UK police make multiple arrests in the retail cyberattack case. French authorities arrest a Russian basketball player at the request of the U.S. A German court declares open season on Meta’s tracking ...
In the season finale of CISOP, Kim Jones is joined by N2K’s own Ethan Cook to reflect on the conversations that shaped this season. Together, they revisit standout moments from Kim’s interviews, ...
Patch Tuesday. An Iranian ransomware group puts a premium on U.S. and Israeli targets. Batavia spyware targets Russia’s industrial sector. HHS fines a Texas Behavioral Health firm for failed risk ...
The FAIK Files explores the mysterious and often wacky intersection of AI, technology, and humanity. From cognitive warfare to digital deception, we examine how AI is reshaping our reality through ...
Every Saturday, we sit down with cybersecurity researchers to talk shop about the latest threats, vulnerabilities, and technical discoveries.
Hear directly from the Microsoft Threat Intelligence community as they navigate the evolving threat landscape, uncovering untold stories of APTs, malware, and other weird and cool tools and tactics in ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results