The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
📻 Siste episoder av CyberWire Daily
Her er de nyeste episodene tilgjengelige via RSS-feeden:
The phishing kit that thinks like a human. [Research Saturday] (00:25:52)
Piotr Wojtyla, Head of Threat Intel and Platform at Abnormal AI, is discussing their work on "InboxPrime AI: New Phishing Kit Fueling Scalable, AI-Powered Cybercrime." A new AI-powered phishing kit ca...
Patch or pull the plug. (00:26:50)
CISA cracks down on aging edge devices. Congress looks to sure up energy sector security. DHS facial recognition software may fall short. Romania’s national oil pipeline operator suffers a cyberattack...
The quietest weapon in America’s loudest strike. (00:31:42)
Cyber weapons knock out Iranian air defenses during strikes on nuclear sites. ShinyHunters dump more than a million stolen records from Harvard and Penn. Betterment confirms a breach exposing data fro...
A softer touch on cyber. (00:28:07)
The White House preps a major overhaul of U.S. cybersecurity policy. A key Commerce security office loses staff as regulatory guardrails weaken. Lawmakers Press AT&T and Verizon after months of silenc...
The algorithm gets questioned. (00:26:50)
French police raid X’s Paris offices. The Feds take over $400 million from a dark web cryptocurrency mixer. The NSA says zero-trust goes beyond authentication. Researchers warn of a multi-stage phishi...
Mid season reflection with Kim Jones. [CISO Perspectives] (00:41:27)
Please enjoy this encore of CISO Perspectives.
In this mid-season episode, Kim takes a step back to reflect on the journey so far—revisiting key conversations, standout moments, and recurring themes ...
Wind and solar take a cyber hit. (00:25:17)
Poland says weak security left parts of its power grid exposed. A Russian-linked hacker alliance threatens Denmark with a promised cyber offensive. Fancy Bear moves fast on a new Microsoft Office flaw...
Richard Melick: Finding the right pattern to solve the problem. [Threat reporting] [Career Notes] (00:09:41)
Please enjoy this encore of Career Notes.
Richard Melick, Director of Threat Reporting for Zimperium, talks about his journey, from working in the military to moving up to the big screens. He shares...
Leaky chats collide with shifting security standards. (00:25:16)
A popular chatbot exposes millions of private user messages. The White House rescinds Biden-era federal software security guidance. A senior Secret Service official urges more scrutiny of domain regis...
Proxy wars and open doors. (00:30:24)
Google dismantles a huge residential proxy network. Did the FBI take down the notorious RAMP cybercrime forum? A long running North Korea backed cyber operation has splintered into three specialized t...
When the Director uses the wrong chat window. (00:25:06)
CISA’s interim director uploaded sensitive government material into the public version of ChatGPT. The cyberattack on Poland’s power grid compromised roughly 30 energy facilities. The EU and India sig...
“The hackers made me do it,” or did they? (00:27:43)
Microsoft rushes an emergency fix for an actively exploited Office zero-day. A suspected cyberattack halts rail service in Spain. The FBI probes Signal chats in Minnesota. The UK moves to overhaul pol...
How do you gain “experience” in cyber without a job in cyber? [CISO Persepctives] (00:39:17)
Please enjoy this encore of CISO Perspectives.
We're sharing a episode from another N2K show we thought you might like. It's the third episode of the new season of the show CISO Perspectives with Kim...
When encryption meets enforcement. (00:32:03)
Microsoft granted the FBI access to laptops encrypted with BitLocker. The EU opens an investigation into Grok’s creation of sexually explicit images. Glimmers of access pierce Iran’s internet blackout...
Lauren Van Wazer: You have to be your own North Star. [CISSP] [Career Notes] (00:08:47)
Please enjoy this encore of Career Notes.
Lauren Van Wazer, Vice President, Global Public Policy and Regulatory Affairs for Akamai Technologies, shares her story as she followed her own North Star an...
Caught in the funnel. [Research Saturday] (00:23:33)
Today we have Andrew Northern, Principal Security Researcher at Censys, discussing "From Evasion to Evidence: Exploiting the Funneling Behavior of Injects". This research explains how modern web malwa...
TikTok lives to scroll another day. (00:30:04)
At long last, a TikTok deal. Officials urge lawmakers to keep an eye on the quantum ball. Fortinet confirms active exploitation of a critical authentication bypass flaw. Ireland plans to authorize spy...
Stabilized but smaller. (00:24:39)
CISA’s acting director assures Congress the agency has “stabilized”. Google and Cisco patch critical vulnerabilities. Fortinet firewalls are being hit by automated attacks that create rogue accounts. ...
DOGE and the data trail. (00:27:02)
DOGE staff face scrutiny over possible Hatch Act violations. GitLab fixes a serious 2FA bypass. North Korean hackers target macOS developers through Visual Studio Code. Researchers say the VoidLink ma...
Million-dollar hacks and a manhunt. (00:23:12)
Authorities pursue Black Basta. British authorities launch a new national service to fight fraud and cybercrime. LinkedIn private messages get infected with RATs. Researchers uncover a new malicious e...
Are we a trade or a profession? [CISO Perspectives] (00:44:33)
Please enjoy this encore of CISO Perspectives.
We're sharing a episode from another N2K show we thought you might like. It's the second episode of the new season of the show CISO Perspectives with Ki...
Investing in the security tech market with NightDragon. [T-Minus Space Daily Special Edition] (00:19:38)
While our team is away from the mic observing the Martin Luther King, Jr. holiday in the United States, we share this thoughtful discussion from our T-Minus Space Daily team.
Signals Intelligence ...
Pentesting at the speed of thought. [CyberWire-X] (00:24:10)
While our team is observing the Martin Luther King, Jr. holiday in the United States, please enjoy this CyberWire-X episode featuring the team from Horizon3.ai.
In this CyberWire-X episode, Dave B...
Deepen Desai: A doctor in computer viruses. [CISO] [Career Notes] (00:09:48)
Please enjoy this encore of Career Notes.
Deepen Desai, Global Chief Information Security Officer at Zscaler, shares his story as a doctor that treats computer viruses. He describes how he got into ...
Today we are joined by Ben Folland, Security Operations Analyst from Huntress, discussing their work on "ClickFix Gets Creative: Malware Buried in Images." This analysis covers a ClickFix campaign tha...