News

In this week's episode: NVIDIA’s Diffusion Renderer: We explore NVIDIA's new research into real-time diffusion rendering, a potential game-changer in photorealistic generation; Robotics Powered by ...
A critical vulnerability in SUSE [SOO-suh] Manager allows attackers to run commands with root privilege. A joint CISA and U.S. Coast Guard threat hunt at a critical infrastructure site reveals serious ...
This week, Ben's story is on the looming expiration of the Cybersecurity Information Sharing Act (CISA 2015), a widely supported but currently stalled law that enables cyber threat data sharing ...
Matt Calligan, Director of Revenue Operations at ArmorText, joins us from Iceland to talk about what it takes to build a sales motion from scratch in cybersecurity when your product is built for ...
In this week's episode: Subliminal Learning: Listener "Max" brings us a fascinating (and concerning) story about AI model distillation and how "dark knowledge" can be passed along between AI systems; ...
This week, our hosts⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily ...
Microsoft issues emergency updates for zero-day SharePoint flaws. Alaska Airlines resumes operations following an IT outage. The UK government reconsiders demands for Apple iCloud backdoors. A French ...
A sweeping malware campaign by North Korea’s Lazarus Group targets open source ecosystems. President Trump announces a new electronic health records system. A new report reveals deep ties between ...
Muddled Libra is back and more dangerous than ever. In this episode of Threat Vector, David Moulton speaks with ⁠Sam Rubin⁠ and ⁠Kristopher Russo⁠ from Unit 42 about the resurgence of the threat group ...
Officials in St. Paul, Minnesota declare a state of emergency following a cyberattack. Hackers disrupt a major French telecom. A power outage causes widespread service disruptions for cloud provider ...
Things get worse in the Tea dating app breach. CISA adds three vulnerabilities to its Known Exploited Vulnerabilities catalog. Researchers uncover a critical flaw in Google’s AI coding assistant. A ...