Search the site
Industry Insights
Podcasts
Briefings
Stories
Events
Glossary
N2K Pro
CISO Perspectives
Podcasts
Briefings
Pro Academy
New
Hash Table
1
st
Principles Course
About
Our Story
Press
Team
Testimonials
Sponsor
Partners
Dev
API
Account
Profile
Logout
Home
Search the site
Industry Insights
Podcasts
Briefings
Stories
Events
Glossary
N2K Pro
CISO Perspectives
Podcasts
Briefings
Pro Academy
New
Hash Table
1
st
Principles Course
Dev
API
About
Our Story
Press
Team
Testimonials
Sponsor
Partners
December 5, 2025
Join Pro
LOGIN
Dec 4, 2025
Jumping into a time machine.
This week, Ben Yelin discusses the new California Opt Me Out Act that requires web browsers to offer a one-click “opt-out” setting that stops companies from selling or sharing your data. Dave Bittner bring the story about the Supreme Court of the United States weighing whether internet service providers must cut off users who repeatedly pirate content — a ruling that could transform how online piracy is policed and overhaul liability for ISPs. Ben and Dave are joined by Daniel Woods, Principal Security Researcher at Coalition, to discuss the rise of cyber insurance exclusions and the consequences of this trend.
Caveat
Dec 4, 2025
Jumping into a time machine.
This week, Ben Yelin discusses the new California Opt Me Out Act that requires web browsers to offer a one-click “opt-out” setting that stops companies from selling or sharing your data. Dave Bittner bring the story about the Supreme Court of the United States weighing whether internet service providers must cut off users who repeatedly pirate content — a ruling that could transform how online piracy is policed and overhaul liability for ISPs. Ben and Dave are joined by Daniel Woods, Principal Security Researcher at Coalition, to discuss the rise of cyber insurance exclusions and the consequences of this trend.
Caveat
Cybersecurity News
Daily Briefing
3 hours ago
Threat actors exploit maximum-severity React flaw.
US and Canadian intelligence agencies outline Chinese malware campaign. Twin brothers arrested in Virginia for allegedly stealing and destroying government data.
The FAIK Files
15 hours ago
No, No - Not Like THAT!!!
In this week's episode: Leaks confirm OpenAI is preparing to roll out ads on ChatGPT; We discuss Grok's bias toward Elon Musk and security flaws in Deepseek; Is Gemini training on your email inbox? We try to find the answer; AI is still broken in interesting ways: Jailbreaking with poetry and an inappropriate AI teddy bear.
CyberWire Daily
23 hours ago
Pay cuts and a personnel freefall.
CISA staff may see pay cuts in 2026. Threat actors advertise a full chain zero-day exploit for iOS. A US-led international coalition releases joint guidance on integrating AI into operational technology. Microsoft lowers sales growth targets for its agentic AI products. A major fintech provider suffers a ransomware-linked breach. Arizona’s Attorney General sues Temo over data collection practices. Lessons learned from Capita’s handling of Black Basta. The UK sanctions Russia’s GRU. My guest is Dave Baggett, co-founder and CEO of INKY (recently acquired by Kaseya), about the challenges of email security. A U.S. Bankruptcy Court insists on AI transparency.
Caveat
23 hours ago
South Korea suffers massive data leak.
India mandates new smartphone security app.
Daily Briefing
Dec 4, 2025
Marquis breach affects dozens of banks and credit unions.
Threat actor advertises plausible iOS chain exploit. ClayRat Android malware gets an upgrade.
Threat Vector
Dec 4, 2025
Securing the Modern Workforce - Lessons from Medallia’s CISO
In this episode of Threat Vector, host David Moulton, Senior Director of Thought Leadership at Unit 42, speaks with Jiphun Satapathy, SVP and CISO of Medallia. They discuss how security and user experience must coexist in today’s hybrid and AI-driven workplace. Satapathy explains how Medallia secures its global workforce, manages SaaS adoption, and uses enterprise browsers to protect users without adding friction. The conversation explores GenAI risk, shadow AI, endpoint visibility, and how SASE architecture enables smarter, safer workflows. Learn how CISOs can rethink old processes to keep innovation and protection in balance.
Hacking Humans
Dec 4, 2025
A fish commits credit card fraud (inadvertently).
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow up from listener John Helt having some chicken withdrawal, Foghorn Leghorn excluded. You are welcome, John, you now have your chicken updates! And, we share how a fish went shopping. This is not a phish. Maria shares some research (including her own) on using AI chatbots to phish the elderly. Joe’s got two stories today. First up, he talks about the Myanmar army continuing their raids on scam centers. Joe also shares a piece on two men found guilty of engaging in an extensive fraud scheme of ACA plan subsidies involving over $233 million from the federal government. Dave's story helps keep scammers out of your stockings this holiday season. Our catch of the day comes from the phishing subreddit about a text a la Strong Bad.
Business
Dec 3, 2025
ServiceNow reportedly intends to acquire Veza for more than $1 billion.
Zafran Security has raised $60 million in a Series C round.
CyberWire Daily
Dec 3, 2025
Just another day of scamming and jamming.
The DOJ shuts down another scam center in Myanmar. OpenAI confirms a Mixpanel data breach. A new phishing campaign targets company executives. A bipartisan bill looks to preserve the State and Local Cybersecurity Grant Program. Universities suffer Oracle EBS data breaches. India reports GPS jamming at eight major airports. Kaiser Permanente settles a class action suit over tracking pixels. The FTC plans to require a cloud provider to delete unnecessary student data. An international initiative is developing guidelines for commercial spyware. Our N2K Producer Liz Stokes speaks with Kristiina Omri, Director of Special Programs for CybExer Technologies about the cyber ranges for NATO and ESA. Iranian hackers give malware a retro reboot.
Daily Briefing
Dec 3, 2025
US Justice Department disrupts Myanmar-based scam operation.
OpenAI discloses Mixpanel breach. University of Pennsylvania and the University of Phoenix confirm Oracle EBS compromises.
Microsoft Threat Intelligence
Dec 3, 2025
The Grid, a Digital Frontier: E-ISAC on Securing the Power Grid
In this episode of the Microsoft Threat Intelligence Podcast, host Sherrod DeGrippo is joined by Matt Duncan, Vice President of Security Operations and Intelligence at the North American Electric Reliability Corporation’s E-ISAC, to explore the cyber threats targeting the North American power grid. Matt breaks down why the grid remains resilient despite increasing pressure from nation-states, cybercriminals, and hacktivists, how AI is lowering the barrier of entry for attackers, and why OT systems and interconnected devices present unique risks. He also highlights real success stories, the value of large-scale grid exercises, and how strong collaboration and a focus on foundational security practices help defenders keep power flowing safely and reliably.
Marketing
Dec 3, 2025
Episode 1: ManageEngine - Live interviews from ManageEngine Userconf in Las Vegas, NV
We took the podcast on the road for this one. Gianna spent two days roaming the ManageEngine User Conference in Las Vegas, mic in hand, slightly over-caffeinated, talking with the people who actually keep this massive IT management ecosystem running. This episode brings together conversations with the CMO, the team leading North America operations and partnerships, and one of ManageEngine’s longtime global channel partners. Different roles, different vantage points, but everyone came back to the same theme: trust. Not the buzzword version, the real kind, where meeting someone face-to-face finally puts a human behind the support ticket. And yes, Part 2 is on the way. We’ve got more interviews from the conference floor, including late-night influencer conversations and a studio-recorded session with the VP of Product. Think of this episode as the first half of the full story.
Load More
Gain instant access to our exclusive podcast and briefing content, the Pro Academy, live events and more by subscribing to N2K Pro.
Subscribe Now