Search the site
Industry Insights
Podcasts
Briefings
Stories
Events
Glossary
N2K Pro
CISO Perspectives
Podcasts
Briefings
Pro Academy
New
Hash Table
1
st
Principles Course
About
Our Story
Press
Team
Testimonials
Sponsor
Partners
Dev
API
Account
Profile
Logout
Home
Search the site
Industry Insights
Podcasts
Briefings
Stories
Events
Glossary
N2K Pro
CISO Perspectives
Podcasts
Briefings
Pro Academy
New
Hash Table
1
st
Principles Course
Dev
API
About
Our Story
Press
Team
Testimonials
Sponsor
Partners
January 16, 2026
Join Pro
LOGIN
Jan 15, 2026
Consent is not optional.
This week, Ben and Dave discuss the ongoing controversy surrounding Grok and its ability to generate nonconsensual nude images, raising fresh concerns about AI safeguards, consent, and accountability, before turning to a conversation with Caitlin Clarke, Senior Director for Cybersecurity Services at Venable, who breaks down the Cybersecurity Information Sharing Act of 2015 (CISA).
Caveat
Jan 15, 2026
Consent is not optional.
This week, Ben and Dave discuss the ongoing controversy surrounding Grok and its ability to generate nonconsensual nude images, raising fresh concerns about AI safeguards, consent, and accountability, before turning to a conversation with Caitlin Clarke, Senior Director for Cybersecurity Services at Venable, who breaks down the Cybersecurity Information Sharing Act of 2015 (CISA).
Caveat
Cybersecurity News
Daily Briefing
4 hours ago
Maduro capture demonstrated US cybercapabilities.
Suspected Chinese threat actor is using Venezuela-themed spearphishing lures. Dutch police arrest alleged AVCheck operator.
The FAIK Files
16 hours ago
Attack Your Company with Deepfakes (feat. Jason Thatcher of Breacher.ai)
In this week's special interview episode: We sit down with Jason Thatcher, a Deepfake Red Teaming expert from Breacher.ai; we discuss why static deepfakes (like voicemail) are currently outperforming live video attacks; the emerging threat of "Agentic AI" and how it changes the landscape for 2026; and, why teaching people to "spot the glitch" creates a false sense of security.
CyberWire Daily
Jan 15, 2026
A long day without bars.
Verizon hit by a major wireless outage. Poland blocks an attack on its power grid. A massive database of French citizens exposed. Microsoft shuts down a cybercrime-as-a-service operation. The UK backs away from digital ID plans. California probes Grok deepfakes. The FTC settles with GM over location data. Palo Alto Networks patches a serious firewall flaw. Plus, John Serafini of HawkEye on modern signals intelligence, and federal agents seize devices from a Washington Post reporter.
Caveat
Jan 15, 2026
India looks to force smartphone makers to submit source codes.
OpenAI partners with kids’ safety group on ballot measure.
Daily Briefing
Jan 15, 2026
Verizon restores services following widespread outage.
Poland says it thwarted suspected Russian cyberattack against energy infrastructure. Microsoft disrupts the RedVDS cybercrime subscription service.
Threat Vector
Jan 15, 2026
Securing AI Without Slowing Business
In this milestone 100th episode of Threat Vector, David Moulton sits down with Nikesh Arora, Chairman and CEO of Palo Alto Networks, for a candid conversation on the modern security landscape and what it takes to lead through sustained disruption. Nikesh shares why AI is not just another technology cycle, how security too often becomes an afterthought during innovation, and what responsible adoption looks like when data, sovereignty, and automation collide. They also unpack how platform strategy, SOC transformation, and principled decision-making shape Palo Alto Networks’ focus on being the cybersecurity partner of choice for customers navigating what comes next.
Hacking Humans
Jan 15, 2026
When a scammer meets the Force.
This week, while Maria Varmazis (also host of the T-Minus Space Daily show) is out, our hosts Dave Bittner and Joe Carrigan are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Joe starts us off with a chicken update. Joe’s story is on CrowdStrike’s 2025 Global Threat Report, which reveals faster-than-ever breakout times, a surge in vishing and initial access attacks, widespread abuse of valid accounts, and a growing shift toward malware-free intrusions as adversaries become more numerous and sophisticated. Dave’s got the story on how “pig-butchering” romance scams are industrialized, detailing Reuters’ reporting on cyberfraud gangs using step-by-step psychological playbooks to groom victims, manufacture emotional attachment, and rapidly funnel them into fake investments that leave lasting financial and emotional damage. Rishika Desai, Threat Researcher and Writer from Bfore.ai, joins Dave and Joe to discuss renting social media ad accounts for scamming purposes. Our catch of the day comes from Reddit, where one user channels their inner Jedi and uses the Force to send a pesky scammer retreating to the dark side.
CyberWire Daily
Jan 14, 2026
CVEs don’t sleep.
Patch Tuesday fallout, China sidelines Western security vendors, and a critical flaw puts industrial switches at risk of remote takeover. A ransomware attack disrupts a Belgian hospital, crypto scams hit investment clients, and Eurail discloses a data breach. Analysts press Congress to go on offense in cyberspace, and Sean Plankey gets another shot at leading CISA. In our Threat Vector segment, David Moulton sits down with Ian Swanson, AI Security Leader at Palo Alto Networks about supply chain security. And, an AI risk assessment cites a football match that never happened.
Business
Jan 14, 2026
CrowdStrike agrees to acquire SGNL for $740 million and Seraphic for $420 million.
Torq raises $140 million in a Series D round.
Daily Briefing
Jan 14, 2026
Patch Tuesday notes.
China tells domestic companies to stop using US- and Israeli-made cybersecurity software. Spanish police arrest dozens of alleged Black Axe members.
Microsoft Threat Intelligence
Jan 14, 2026
Open SesameOp: Abusing trusted AI platforms to host a C2 server
To kick off Season 3 of Microsoft Threat Intelligence Podcast, host Sherrod DeGrippo is joined by Microsoft security researchers Anna Seitz and Jonathan Checchi. Our guests examine two developments shaping today’s threat landscape: the cloud-native evolution of ransomware group Storm-0501 and the SesameOp backdoor’s abuse of trusted AI platforms for stealthy command-and-control. The discussion highlights how identity, hybrid-cloud pivot points, and federated authentication enable high-impact attacks without traditional malware, and why policy-compliant platform abuse is becoming harder to detect. Sherrod, Anna, and Jonathan provide guidance for defenders around enforcing MFA, tightening conditional access and identity controls, monitoring across cloud and on-prem environments, and partnering with platform providers to disrupt emerging attacker tradecraft.
Marketing
Jan 14, 2026
How Cybersecurity Buyers Decide Before the Sales Conversation Begins
Maria and Gianna are joined this week by Tyler Lessard, Chief Marketing Officer at TechnologyAdvice, for a grounded look at how cybersecurity and B2B buying behavior are shifting and what that means for marketers trying to break through the noise. The conversation centers on preference marketing and why buyers are forming vendor shortlists earlier than ever, often before any formal evaluation begins. Tyler shares insights from TechnologyAdvice’s research on how younger buying committees, particularly Millennial and Gen Z decision-makers, rely less on legacy analyst models and more on trusted external channels like creators, newsletters, niche communities, Reddit, and peer-driven influence. The discussion wraps with a takeaway for marketers planning: TechnologyAdvice’s Cybersecurity Marketing Handbook, built to help teams identify where influence actually lives and how to show up there with intent.
Load More
Gain instant access to our exclusive podcast and briefing content, the Pro Academy, live events and more by subscribing to N2K Pro.
Subscribe Now