
Sign up to save your podcasts
Or
Iran is known to be one of the world’s major nation-state actors in cyberspace and that fact has returned to the forefront since its war with Israel started on June 13.
David DiMolfetta, who covers cyber for our partner publication Nextgov/FCW, joins for this episode to break down how Iran typically operates in cyber and what U.S. government agencies are watching out for as the conflict continues.
The defense industrial base is also on notice for potential intrusions on their systems, as David explains to our Ross Wilkers.
David also provides an update on what we are learning about the breach into U.S. telecommunications networks, which was carried out by the Chinese hacking group known as Salt Typhoon but discovered two years after it started.
Iran-backed hackers may target US defense companies tied to Israel, agencies warn
DHS expects Iran’s cyber forces will target US networks after strikes on nuclear sites
US charges Iranian operatives with hacking Trump campaign
Trump campaign allegedly hacked, blames Iran for stealing internal communications
Treasury sanctions Iranian cyber officials tied to 2023 water system hacks
US agencies assessed Chinese telecom hackers likely hit data center and residential internet providers
FBI awaits signal that Salt Typhoon is fully excised from telecom firms, official says
Salt Typhoon hacks ‘a wake up call’ to secure telecom services, lawmakers say
Salt Typhoon hackers possibly targeted telecom research at US universities
US sanctions Chinese firm behind sweeping Salt Typhoon telecom hacks
At least 8 US carriers hit in Chinese telecom hacks, senior official says
Chinese telecom espionage began with ‘much broader’ aims, officials say
Hundreds of organizations were notified of potential Salt Typhoon compromise
NYPD officer database had security flaws that could have let hackers covertly modify officer data
4.6
88 ratings
Iran is known to be one of the world’s major nation-state actors in cyberspace and that fact has returned to the forefront since its war with Israel started on June 13.
David DiMolfetta, who covers cyber for our partner publication Nextgov/FCW, joins for this episode to break down how Iran typically operates in cyber and what U.S. government agencies are watching out for as the conflict continues.
The defense industrial base is also on notice for potential intrusions on their systems, as David explains to our Ross Wilkers.
David also provides an update on what we are learning about the breach into U.S. telecommunications networks, which was carried out by the Chinese hacking group known as Salt Typhoon but discovered two years after it started.
Iran-backed hackers may target US defense companies tied to Israel, agencies warn
DHS expects Iran’s cyber forces will target US networks after strikes on nuclear sites
US charges Iranian operatives with hacking Trump campaign
Trump campaign allegedly hacked, blames Iran for stealing internal communications
Treasury sanctions Iranian cyber officials tied to 2023 water system hacks
US agencies assessed Chinese telecom hackers likely hit data center and residential internet providers
FBI awaits signal that Salt Typhoon is fully excised from telecom firms, official says
Salt Typhoon hacks ‘a wake up call’ to secure telecom services, lawmakers say
Salt Typhoon hackers possibly targeted telecom research at US universities
US sanctions Chinese firm behind sweeping Salt Typhoon telecom hacks
At least 8 US carriers hit in Chinese telecom hacks, senior official says
Chinese telecom espionage began with ‘much broader’ aims, officials say
Hundreds of organizations were notified of potential Salt Typhoon compromise
NYPD officer database had security flaws that could have let hackers covertly modify officer data
3,195 Listeners
3,476 Listeners
16,101 Listeners
2,395 Listeners
6,670 Listeners
9,202 Listeners
2,317 Listeners
136 Listeners
6,751 Listeners
5,414 Listeners
9,189 Listeners
15,237 Listeners
2,202 Listeners
256 Listeners
1,127 Listeners