Search the site
Industry Insights
Podcasts
Briefings
Stories
Events
Glossary
N2K Pro
CISO Perspectives
Podcasts
Briefings
Pro Academy
New
Hash Table
1
st
Principles Course
About
Our Story
Press
Team
Testimonials
Sponsor
Partners
Dev
API
Account
Profile
Logout
Home
Search the site
Industry Insights
Podcasts
Briefings
Stories
Events
Glossary
N2K Pro
CISO Perspectives
Podcasts
Briefings
Pro Academy
New
Hash Table
1
st
Principles Course
Dev
API
About
Our Story
Press
Team
Testimonials
Sponsor
Partners
May 18, 2025
Join Pro
LOGIN
May 17, 2025
Leveling up their credential phishing tactics.
This week, Dave speaks with Max Gannon of Cofense Intelligence to dive into his team's research on "The Rise of Precision-Validated Credential Theft: A New Challenge for Defenders." Threat actors continuously develop new tactics, techniques, and procedures (TTPs) to bypass existing defenses. When defenders identify these methods and implement countermeasures, attackers adapt or create more sophisticated approaches. This research explores how cybercriminals are leveling up their credential phishing tactics using Precision-Validated Phishing, a technique that leverages real-time email validation to ensure only high-value targets receive the phishing attempt.
Research Saturday
May 17, 2025
Leveling up their credential phishing tactics.
This week, Dave speaks with Max Gannon of Cofense Intelligence to dive into his team's research on "The Rise of Precision-Validated Credential Theft: A New Challenge for Defenders." Threat actors continuously develop new tactics, techniques, and procedures (TTPs) to bypass existing defenses. When defenders identify these methods and implement countermeasures, attackers adapt or create more sophisticated approaches. This research explores how cybercriminals are leveling up their credential phishing tactics using Precision-Validated Phishing, a technique that leverages real-time email validation to ensure only high-value targets receive the phishing attempt.
Research Saturday
Cybersecurity News
Week that Was
May 17, 2025
Coinbase offers $20 million bounty for arrest of extortionists.
US steel manufacturer hit by cyberattack. Marks and Spencer confirms customer data was stolen during cyberattack. Co-op continues recovery from cyberattack.
CyberWire Daily
May 16, 2025
Preparing for the cyber battlespace.
NATO hosts the world’s largest cyber defense exercise. The DOJ charges a dozen people in a racketeering conspiracy involving the theft of over $230 million in cryptocurrency. Japan has enacted a new Active Cyberdefense Law. Lawmakers push to reauthorize the Cybersecurity Information Sharing Act. Two critical Ivanti Endpoint Manager Mobile vulnerabilities are under active exploitation. Hackers use a new fileless technique to deploy Remcos RAT. The NSA’s Director of Cybersecurity hangs up their hat. Our guest is Christopher Cleary, VP of ManTech's Global Cyber Practice, discussing the cyber battlespace of the future. Coinbase flips the script on an extortion attempt.
story
May 16, 2025
The battlespace of the future is here with Christopher Cleary, ManTech
Christopher Cleary, Vice President of Global Cyber Practice at ManTech, joins Dave Bittner, host of the CyberWire Daily podcast, for a sponsored Industry Voices conversation recorded at RSAC 2025. They explore the escalating cyber threats facing the U.S., highlighting the vulnerabilities in critical infrastructure, the sophisticated tactics of foreign adversaries, and the urgent need for greater public-private coordination.
Daily Briefing
May 16, 2025
Co-op continues recovery from cyberattack.
US DOJ charges twelve more suspects in theft of $263 million in cryptocurrency. APT28 exploits webmail vulnerabilities to target government agencies.
The FAIK Files
May 16, 2025
Strategic Ghosts, Synthetic Hosts
In this week's episode: An Australian radio station created a fake Asian female host using AI The BBC resurrects Agatha Christie while a family member brings a murder victim to court We break down "Strategic Text Strings" - sequences of gibberish that can jailbreak AI systems AI recruitment tools might be making hiring worse, not better
story
May 15, 2025
RSAC 2025: Devin Ertel of Menlo Security
Devin Ertel, CISO at Menlo Security sits down with Dave Bittner for a conversation at RSAC 2025. They explore the future of secure browsing, the challenges of modern workspaces, the role of AI in shaping access and attack surfaces, and how enterprise browsers support Zero Trust strategies.
CyberWire Daily
May 15, 2025
Bypassing Bitlocker encryption.
Google issues an emergency patch for a high-severity Chrome browser flaw. Researchers bypass BitLocker encryption in minutes. A massive Chinese-language black market has shut down. The CFPB cancels plans to curb the sale of personal information by data brokers. A cyberespionage campaign called Operation RoundPress targets vulnerable webmail servers. Google warns that Scattered Spider is now targeting U.S. retail companies. The largest steelmaker in the U.S. shut down operations following a cybersecurity incident. Our guest is Devin Ertel, Chief Information Security Officer at Menlo Security, discussing redefining enterprise security. The long and the short of layoffs.
Caveat
May 15, 2025
Senators aim to limit airport face scanning practice.
NSO ordered to pay $170 million for hacking WhatsApp accounts.
Daily Briefing
May 15, 2025
Google patches Chrome vulnerability with public exploit.
Coinbase offers $20 million bounty for arrest of extortionists. US steel manufacturer hit by cyberattack.
Threat Vector
May 15, 2025
Can you supercharge security with a browser?
In this episode of Threat Vector, Ofer Ben‑Noon steps in as guest host to interview cybersecurity strategist Kirsten Davies. They explore why browsers now handle 85 percent of work and how that shift makes them the prime attack surface. Learn how phishing and session hijacks exploit low‑friction paths, why Zero Trust and enterprise browsers must work hand in glove, and how AI can spot anomalies before data is lost. Tune in for practical guidance on balancing seamless user experience with powerful browser defense.
Hacking Humans
May 15, 2025
The band is finally back together.
And....we're back! This week, our three hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are all back to share the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. The team shares three bits of follow-up and then breaks into their stories. Joe starts off sharing some stories about influencer fakery on fake private jet sets and a scam taking advantage of the RealID requirements coming into effect. Maria talks about "Scam Survivor Day" (it's a real thing). She also talks about a former Facebooker's tell-all "Careless People." Dave shares a story about fake Social Security statements. Our Catch of Day comes from Richard about a truck win.
Caveat
May 15, 2025
Diving deep into critical infrastructure.
In this Caveat Policy Deep Dive, our conversation and analysis revolve around critical infrastructure policy. Throughout this conversation, we break down how critical infrastructure policy has evolved over the past fifteen years and what policies have been behind some of these advancements. Some key topics focused on during this conversation center on some of the centralization of infrastructure management policies, the creation of CISA, and how the second Trump administration is changing the federal government's approach when managing critical infrastructure.
Load More
Gain instant access to our exclusive podcast and briefing content, the Pro Academy, live events and more by subscribing to N2K Pro.
Subscribe Now