Andrew Hammond, Ph.D. is Historian & Curator at the International Spy Museum, home of the world's preeminent collection of intelligence-related artifacts. Previous chapters have included seven years ...
Meet David Moulton, the voice for Threat Vector, the Palo Alto Networks podcast dedicated to sharing knowledge, know-how, and groundbreaking research to safeguard our digital world. Moulton, leads ...
The practice of sending a high volume of spamming multifactor authentication (MFA) login attempts to an account until the account’s owner accepts the MFA prompt out of desperation, wishing to make the ...
Dave Bittner is a security podcast host and one of the founders at CyberWire. He's a creator, producer, videographer, actor, experimenter, and entrepreneur. He's had a long career in the worlds of ...
Terms often used in discussions of cyber security, briefly defined. Your corrections, suggestions, and recommendations for additional entries are welcome: email the editor at editor@thecyberwire.com.
To get access to ad-free episodes, exclusive podcasts, unlimited briefings, stories, and transcripts, and other valuable bonus features sign up today. President Biden issues a comprehensive ...
Dave Bittner is a security podcast host and one of the founders at CyberWire. He's a creator, producer, videographer, actor, experimenter, and entrepreneur. He's had a long career in the worlds of ...
A phishing attack that uses a malicious QR code instead of a link or an attachment. "QR code phishing" on the Word Notes podcast.
Dave Bittner is a security podcast host and one of the founders at CyberWire. He's a creator, producer, videographer, actor, experimenter, and entrepreneur. He's had a long career in the worlds of ...
A defensive cyber operation carried out by US Cyber Command’s Cyber National Mission Force (CNMF) at the request of an allied nation. "hunt forward operation" on the Word Notes podcast.
The state of a web application when it's vulnerable to attack due to an insecure configuration. One of OWASP's top-ten categories of application security risk. "OWASP security misconfiguration" on the ...
To get access to ad-free episodes, exclusive podcasts, unlimited briefings, stories, and transcripts, and other valuable bonus features sign up today.