Welcome back to The FAIK Files! When tech gets weird, we're here to help make sense of it all. This week, we’re tackling: -DeepSeek -- the little LLM from China that's taking the world by storm.
Join David Moulton, Director of Thought Leadership at Unit 42, as he explores a real-world malware incident that tested BP’s cybersecurity defenses. Featuring Patrick Wright, Forensics and Incident ...
An approach to detecting mallware in which a unique identifier, normally a specific string of code or the hash of known malicious code, is established as associated with some piece of malware. When ...
Meet David Moulton, the voice for Threat Vector, the Palo Alto Networks podcast dedicated to sharing knowledge, know-how, and groundbreaking research to safeguard our digital world. Moulton, leads ...
Terms often used in cybersecurity discussions and education, briefly defined. Your corrections, suggestions, and recommendations for additional entries are welcome: email the editor at [email protected].
To get access to ad-free episodes, exclusive podcasts, unlimited briefings, stories, and transcripts, and other valuable bonus features sign up today. This week, we are joined by Ismael Valenzuela, VP ...
Active eavesdropping in which the attacker makes independent connections with the victims and relays messages between them. The victims thus believe they are communicating directly with one another, ...
In this episode of the Microsoft Threat Intelligence Podcast, host Sherrod DeGrippo is joined by security researchers Elise Eldridge and Anna Seitz to discuss the most recent notable developments ...
N2K Networks launched in October 2022 with its first two brands: CyberWire, the world's leading B2B cybersecurity audio network, and CyberVista, an industry leader in data-driven cybersecurity ...