Search
US government's VPN advice
Surveillance economics
Inside the Turla Playbook: Hijacking APTs and fourth-party espionage
Volexity’s Steven Adair on Russian Wi-Fi hacks
Sid Trivedi on the RSA Innovation Sandbox $5 million investment gambit
Russian APT weaponized nearby Wi-Fi networks in DC
What happens to CISA now? Is deterrence in cyber possible?
Mysterious rebooting iPhones
The Sophos kernel implant
Fortinet 0days
ESET Israel wiper malware
Typhoons and Blizzards: Cyberespionage and national security on front burner
Careto returns
Exploding beepers
Ep13: The Consolation of Threat Intel (JAG-S LABScon keynote)
Ep12: Security use-cases for AI chain-of-thought reasoning
Ep11: Cyberwarfare takes an ominous turn
Ep10: Volt Typhoon zero-day
Ep9: The blurring lines between nation-state APTs and the ransomware epidemic
Ep8: Microsoft's zero-days and a wormable Windows TCP/IP flaw known to China
Ep7: Crowd2K and the kernel
Ep6: After CrowdStrike chaos
Ep5: CrowdStrike's faulty update shuts down global networks
Ep4: The AT&T mega-breach
Ep3: Dave Aitel joins debate on nation-state hacking responsibilities
Ep2: A deep-dive on disrupting and exposing nation-state malware ops
Ep1: The Microsoft Recall debacle
Cris Neckar on the early days of securing Chrome
Costin Raiu joins the XZ Utils backdoor investigation
Katie Moussouris on building a different cybersecurity businesses
Costin Raiu: The GReAT exit interview
Danny Adamitis on an 'unkillable' router botnet used by Chinese .gov hackers
Allison Miller talks about CISO life
Rob Ragan on the excitement of AI solving security problems
Seth Spergel on venture capital bets in cybersecurity
Dan Lorenc on fixing the 'crappy' CVE ecosystem
Cisco Talos researcher Nick Biasini on chasing APTs
Allison Nixon on disturbing elements in cybercriminal ecosystem
Dakota Cary on China's weaponization of software vulnerabilities
Abhishek Arya on Google's AI cybersecurity experiments
Dr Sergey Bratus on the 'citizen science' of hacking
DARPA's Perri Adams on CTF hacking
Ryan Hurst on tech innovation and unsolved problems in security
Jason Chan on Microsoft's security problems
GitHub security chief Mike Hanley on secure coding
Jason Shockey
Federico Kirschbaum on a life in the Argentina hacking scene
Kymberlee Price reflects on life at the MSRC
OpenSSF GM Omkhar Arasaratnam on open-source software security
Serial entrepreneur Rishi Bhargava on building another cybersecurity company
Claude Mandy on CISO priorities
Sidra Ahmed Lefort dishes on VC investments and cyber uncertainties
Paul Roberts on wins and losses in the 'right to repair' battle
Katie Moussouris on where bug bounties went wrong
Robinhood CSO Caleb Sima on a career in the security trenches
Charlie Miller on hacking iPhones
JAG-S on big-game malware hunting and a very mysterious APT
Chainguard's Dan Lorenc gets real on software supply chain problems
Vinnie Liu discusses a life in the offensive security trenches
Down memory lane with Snort and Sourcefire creator Marty Roesch
Subbu Rama
Project Zero's Maddie Stone on the surge in zero-day discoveries
Prof. Mohit Tiwari on the future of securing data at scale
Google's Shane Huntley on zero-days and the nation-state threat landscape
Lamont Orange
Haroon Meer on the business of cybersecurity
Tony Pepper
Microsoft's Justin Campbell on offensive security research
Costin Raiu on the .gov mobile exploitation business
Amanda Gorton
Intel's Venky Venkateswaran on hardware-enabled security
Sounil Yu on SBOMs
Algirde Pipikaite
Josh Schwartz on red-teaming and proactive security engineering
Michael Laventure
Google's Heather Adkins on defenders playing the long game
Collin Greene
Alex Matrosov on the state of security at the firmware layer
Charles Nwatu
Doug Madory on the mysterious AS8003 global routing story
Crossbeam CISO Chris Castaldo on securing the start-up
Shubs Shah on finding riches (and lessons) from bug bounty hacking
Fahmida Rashid
Microsoft's David Weston on the surge in firmware attacks
Lena Smart
Patrick Howell O'Neill
Nico Waisman
Ron Brash on the water plant hacks and the state of ICS security
Throwback: Zero-day exploit broker Chaouki Bekrar
Selena Larson
Fredrick Lee
Zack Whittaker
Jason Chan
Andy Greenberg
Matt Honea
Brooke Pearson
Tim MalcomVetter
Matt Suiche
Jaime Blasco
Collin Mulliner
Michael Piacente
Dave Aitel
Sounil Yu
Andy Ellis
Costin Raiu
Josh Lefkowitz
Christine Gadsby
Chad Loder
Chris Castaldo
Wim Remes
Dan Hubbard
David Weston
Rich Seiersen
Andrew Morris
Yoav Leitersdorf
Juan Andrés Guerrero-Saade
Robert M. Lee
Brandon Dixon
Ryan Huber
Ivan Arce
Sinan Eren
Stephen Ridley
Mischel Kwon
Rick Holland
Thomas Ptacek
Zane Lackey
Haroon Meer
David (int eighty)
Dennis Fisher
Tim Maurer
Will Lin
Pete Chronis
Brad Arkin
Aanchal Gupta
Tom Conklin
John Terrill
Christopher Ahlberg
Masha Sedova
Paul Roberts
Dino Dai Zovi
Sharon Anolik
Kim Zetter
Kelly Jackson Higgins
Katie Moussouris
activists
advisory boards
africa
AI
AI Cyber Challenge
AI models
AIxCC
AMP
android
anonymity
anti-exploitation
anti-virus
antitrust
antivirus
Antiy
Appin
Apple
appliances
appsec
APT
APT 28
APT 41
APT attribution
APT groups
APT names
APT29
APT29 Cyber Attacks
APT29 tactics
APT45
APTs
argentina
Artifical Intelligence
artificial intelligence
as8003
AT&T
AT&T breach
AT&T data breach
Atlantic Council
attack surfaces
attribution
automation
balkanid
Balkanization
Barracuda
BGP
BGP hijacking
Binarly
bios
bitcoin
Bitcoin attacks
black hat
blackberry
blue screens
blue team
Bootkitty
breach detection
browsers
BSOD
bug bounties
bugbounty
business continuity
Canada
canaries
candiru
Career
career guidance
Careto
CET
Chainguard
Chengdu
Chevron deference
China
Chinese APTs
Chinese cyber actors
Chinese surveillance
chip backdoor
chrome
Chrome Flex OS
CIA
CISA
Cisco Talos
CISO
CISO ethics
CISO liability
CISO movements
CISOs
client security
code quality
codecov
coinbase
community building
compliance
continuous testing
core security
corellium
corona virus
corporate relationships
covid
credential theft
crisis management
critical infrastructure
crowdstrike
crypto
cryptocurrency
cryptojacking
csam
CSRB
CVE
cyber espionage
cyber norms
cyber operations
Cyber threat indicators
cyber threats
cyber warfare
cyber-insurance
cybercrime
cyberespionage
cybersecurity
cybersecurity business
Cybersecurity Threats
cyberwar
Cyberwarcon
Dan Geer
dan kaminsky
Dark Reading
DARPA
Dartmouth
data guard
data privacy
data security
data sharing
Davos
DEF CON CTF
DEFCAMP
Defcon
detection
detection update
digital security
digital trust
diplomacy
disclosure
disinformation
disrupting nation-state operations
diversity
Doppelganger
drones
dspm
Duqu
Dutch Intel
eclypsium
edge devices
EDR
EDR software
ekoparty
election interference
elections
email
email security
emulation
encryption
Engagement
entrepreneurship
ESET
espionage
Espionage and Cyber Warfare
exploit brokers
exploit reuse
exploit sales
exploitability
exploitation techniques
exploits
facebook
fake IT workers
FBI
FBI CISA report
firewall devices
firewall vulnerabilities
firmware
FOMO Typhoon
Fortinet
Foundation Capital
Fraud Prevention
funding
generative ai
gig economy
global routing
Goblin Rat
godaddy
google
Google breakup
google project zero
government regulations
GReAT
groups
GRU
h2c smuggling
hack-for-hire
hacking
Hamas
hardware
hardware security
HexRays
hiring
Hitcon
ics
IDA Pro
Identity and Access
ids
iga
implants
incident response
India
influence operations
information sharing
infrastructure attacks
innovation
insurance
intel
intelligence agencies
internet backbone
Internet Explorer
investments
investments and exits
IOCs
iOS
iOS 14.5
iOS 18.2
iOS exploitation
iOS malware
ios self-driving cars
iOS vulnerabilities
IOT
iphone
ips
ipv4
IPv6
Iran
Iran Israel
Iranian hacking
Israel
Ivanti
Japan
jeep
JetBrains TeamCity vulnerability
jiu-jitsu
jobs market
journalism
Kaspersky
key management
Keywords cybersecurity
Kim Zetter
labscon
Lapsu$
law enforcement
layoffs
Lazarus
leadership
legal considerations
Linux
LLMs
log4j
log4shell
macbook
machine learning
MacOS
malware
malware analysis
malware campaigns
MAPP
market solutions
marketing
marty roesch
memory analysis
memory corruption
memory forensics
Memory Safety
mercenary hacking
Merlin Ventures
messaging
metador
microsoft
Microsoft 365 outage
Microsoft Teams exploitation
MIVD
mobile
mobile exploits
mobile stock trading
monoculture
Monokle
msrc
nation-state
nation-state APTs
nation-state malware
National security cyber risks
National Security Risks
Netherlands
netography
network security
network telemetry
network-based attacks
news gathering
NIST
North Korea
npm
NSA
NSO Group
NSO lawsuit
NSO Pegasus
NullBulge
offense vs defense
offensive security
Olympics
open source software
open-source
OpenAI
Palo Alto
pandemic
Paragon
parsers
password-protected phone
patch tuesday
patching shenanigans
Pavel Durov
pay-for-play
PDF
pegasus
pen-testing
penetration testing
PKFail
political interference
Polyfill supply chain
Predatory Sparrow
print spooler
printnightmare
prisoner exchange
privacy
privacy engineering
Private Cloud Computer
pro rata rights
product security
Project Zero
PSOAs
public cloud
Pulse Secure
pwn2own
Q&A
Qihoo 360
quantum
quantum computing
ransomware
recruiting
Red October
red team
regulations
regulatory failures
remediation
research
Reuters
risk management
robinhood
Romania
routers
RPISEC
rsa conference
RSA Innovation Sandbox
rsac
Russia
Russia cyber espionage
S1
saas
SAFE
SafeDocs
Salt Typhoon
Salt Typhoon Hacks
Salt Typhoon vulnerability
Sandboxing
SBOM
SBOMs
scada
Scattered Spider
Section 702
secure boot bypass
secure coding
security
security assessments
security awareness
security framework
security research
security solutions
security updates
securityawareness
securityresponse
self-driving cars
Sentinel One
sentinellabs
serverless
shift-left
Sid Trivedi
simulated hacking attacks
skills-shortage
Skripal
slack
snort
Snowflake
SOC
software liability
software quality
software update
Solana
solarwinds
Sophos
sourcefire
South Korea
spectre
spyware
startup
startups
stolen data
story-telling
Storytelling
Stuxnet
sunburst
supply chain
supply chain attacks
Supply chain cyber attack
surveillance
surveillance capitalism
surveillance industry
surveillance technology
SVR cyber threat
Switzerland
Taiwan
teams
teamviewer breach
Telegram
telemetry
tesla hack
testing
the-com
thinkst
third-party risk
threat detection
threat intelligence
threat-hunting
threat-intel
threatintel
TikTok
TLP
TOR
tpm sniffing
transcript
transparency
Triangulation
Turla
typosquatting
uefi
uefi malware
ukraine
UltraAV
Unit 29155
US-China relations
validation
VC funding
vendor accountability
venture capital
Versa Director
virtualization
Virus Bulletin
VirusTotal
visibility
Volexity
Volt Typhoon
Volt Typoon
vpn
VPNs
vulnerabilities
vulnerability discovery
vupen
web app security
webapp security
whatsapp
White House
Wi-Fi hacking
Wi-Fi security
windows
Windows Defender
Windows kernel
windows os
Windows Recall
wiper
wipers
writing
Xiaomi
XZ Utils
YARA
zero-click exploits
zero-day
zero-day vulnerabilities
Zero-days
zero-trust
zerodium
Zoom