Predatory Sparrow disrupts Iran’s gas stations. An analysis of cyberattacks against Danish energy infrastructure.| N2K CyberWire
In this episode of the Microsoft Threat Intelligence Podcast, host Sherrod DeGrippo is joined by Henning Rauch, to discuss Call of the Cyber Duty is a 42-hour global cybersecurity challenge hosted by Microsoft’s Kusto Detective Agency. The competition runs from 12:00 AM Coordinated Universal Time (UTC) on June 8, 2025, and ends at 12:00 AM UTC on June 18, 2025, at 10:00AM UTC. Once a team member opens the first case, they have 42 hours to complete it.Participant...| N2K CyberWire
In this episode of the Microsoft Threat Intelligence Podcast, host Sherrod DeGrippo is joined by Lauren Proehl, Sydney Marrone, and Jamie Williams to dig into the THOR Collective — a fresh, community-driven initiative bringing modern energy to threat intel. The group discusses the ongoing tension where developers focus on user-friendly design while security professionals aim to break things to prevent malicious use. They also dive into the THOR Collective, a co...| N2K CyberWire
In the ever-evolving landscape of cybersecurity, there's a critical component that often gets overshadowed by the latest technology and sophisticated algorithms: the human element. One reason people tend to forget the human element in cybersecurity is the increasing reliance on and trust in advanced technologies. As artificial intelligence (AI) and machine learning (ML) become more sophisticated, there's a misconception that these tools can autonomously handle security threats without human i...| N2K CyberWire
The CyberWire is an independent voice delivering concise, accessible, and relevant cybersecurity news briefings and cybersecurity podcasts to people all across the globe.| N2K CyberWire
A critical vulnerability in Erlang/OTP SSH allows unauthenticated remote code execution. There’s a bipartisan effort to renew a key cybersecurity info sharing law. A newly discovered Linux kernel vulnerability allows local attackers to escalate privileges. A researcher uncovers 57 risky Chrome extensions with a combined 6 million users. AttackIQ shares StrelaStealer simulations. A major live events service provider notifies employees and customers of a data breach. CISA warns of an actively...| N2K CyberWire
Hear directly from the Microsoft Threat Intelligence community as they navigate the evolving threat landscape, uncovering untold stories of APTs, malware, and other weird and cool tools and tactics in the world of cyber threats.| N2K CyberWire