The CyberWire Daily

The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.

https://thecyberwire.com/podcasts/daily-podcast

Eine durchschnittliche Folge dieses Podcasts dauert 22m. Bisher sind 1843 Folge(n) erschienen. Dies ist ein täglich erscheinender Podcast.

Gesamtlänge aller Episoden: 27 days 1 hour 39 minutes

subscribe
share





episode 117: Profiling the Linken Sphere anti-detection browser. [Research Saturday]


Multiple e-commerce and financial organizations around the world are targeted by cybercriminals attempting to bypass or disable their security mechanisms, in some cases by using tools that imitate the activities of legitimate users. Linken Sphere, an...


share







 2020-01-11  14m
 
 

episode 118: Clever breaches demonstrate IoT security gaps. [Research Saturday]


Some of our favorite and most trusted IoT devices help make us feel secure in our homes. From garage door openers to the locks on our front doors, we trust these devices to recognize and alert us when people are entering our home. It should come as no...


share







 2020-01-18  24m
 
 

episode 119: Know Thine Enemy - Identifying North American Cyber Threats. [Research Saturday]


The electric utility industry is a valuable target for adversaries seeking to exploit industrial control systems (ICS) and operations technology (OT) for a variety of purposes. As adversaries and their sponsors invest more effort and money into...


share







 2020-01-25  29m
 
 

episode 120: Tracking one of China's hidden hacking groups. [Research Saturday]


Operation Wocao (我操, “Wǒ cāo”, is a Chinese curse word) is the name that Fox-IT uses to describe the hacking activities of a Chinese based hacking group. We are joined by Fox-IT's Maarten van Dantzig who shares his insights into their new...


share







 2020-02-01  21m
 
 

episode 121: The Chameleon attacks Online Social Networks. [Research Saturday]


The Chameleon attack technique is a new type of OSN-based trickery where malicious posts and profiles change the way they are displayed to OSN users to conceal themselves before the attack or avoid detection. Joining us to discuss their findings in a...


share







 2020-02-08  19m
 
 

episode 122: If you can't detect it, you can't steal it. [Research Saturday]


BGN Technologies, the technology transfer company of Ben-Gurion University (BGU) of the Negev, Israel, is introducing the first all-optical “stealth” encryption technology that will be significantly more secure and private for highly-sensitive...


share







 2020-02-15  26m
 
 

episode 123: New vulnerabilities in PC sound cards. [Research Saturday]


SafeBreach Labs discovered a new vulnerability in the Realtek HD Audio Driver Package, which is deployed on PCs containing Realtek sound cards.  On this week's Research Saturday, our conversation with Itzik Kotler, who is Co-Founder and CTO at...


share







 2020-02-22  22m
 
 

episode 124: Application tracking in Wacom tablets. [Research Saturday]


Today's Research Saturday features our conversation with Robert Heaton, a software engineer with Stripe who penned a blog post about his disappointing discovery involving his Wacom tablet tracking his applications. The post struck a nerve and has...


share







 2020-02-29  21m
 
 

episode 125: Overworked developers write vulnerable software. [Research Saturday]


Why do some developers and development teams write more secure code than others? Software is written by people, either alone or in teams. Ultimately secure code development depends on the actions and decisions taken by the people who develop the code....


share







 2020-03-07  18m
 
 

episode 126: TLS is here to stay. [Research Saturday]


As websites and apps more widely adopt TLS (Transport Layer Security) and communicate over HTTPS connections, unencrypted traffic may draw even more attention, since it’s easier for analysts and security tools to identify malicious communication...


share







 2020-03-14  19m