Discover
CyberWire Daily

CyberWire Daily
Author: N2K Networks
Subscribed: 28,228Played: 1,646,130Subscribe
Share
© 2024 N2K Networks, Inc. 706761
Description
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
3397 Episodes
Reverse
This season on CISO Perspectives—your host, Kim Jones is digging into the issues shaping the future of cybersecurity leadership. From the regulations every CISO needs to understand, to the unexpected places privacy risks are emerging, to the new ways fraud and identity are colliding—these conversations will sharpen your strategies and strengthen your defenses.
Industry leaders join the discussion to share their insights, challenges, and hard-earned lessons. Together, we’ll connect the dots across regulation, privacy, fraud, leadership, and talent—helping you build a stronger, more resilient cybersecurity ecosystem.
This is CISO Perspectives. Real conversations. Real strategies. Real impact.
Learn more about your ad choices. Visit megaphone.fm/adchoices
UK court blocks government's attempt to keep Apple encryption case secret. Port of Seattle says last year's breach affected 90,000 people. Verizon Call Filter App flaw exposes millions' call records. Hackers hit Australian pension funds. A global threat hiding in plain sight. Cybercriminals are yelling CAPTCH-ya! Meta retires U.S. fact-checking program. Our guest today is Rob Boyce from Accenture and he’s discussing Advanced Persistent Teenagers (APTeens). And Google’s AI Goes Under the Sea.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.
CyberWire Guest
Rob Boyce, Global Lead for Cyber Resilience at Accenture, joins to discuss Advanced Persistent Teenagers (APTeens). Advanced Persistent Teenagers (APTeens) have rapidly become a significant enterprise risk by demonstrating capabilities once limited to organized ransomware groups, the threat from juvenile, homegrown threat-actors has risen steadily.
Selected Reading
UK Effort to Keep Apple Encryption Fight Secret Blocked in Court (Bloomberg)
Port of Seattle says ransomware breach impacts 90,000 people (BleepingComputer)
Call Records of Millions Exposed by Verizon App Vulnerability (SecurityWeek)
Cybercriminals are trying to loot Australian pension accounts in new campaign (The Record)
NEPTUNE RAT Attacking Windows Users to Exfiltrate Passwords from 270+ Apps (Cyber Security News)
Threat Actors Using Fake CAPTCHAs and CloudFlare Turnstile to Deliver LegionLoader (Cyber Security News)
Meta ends its fact-checking program in the US later today, replaces it with Community Notes (Techspot)
Suspected Scattered Spider Hacker Pleads Guilty (SecurityWeek)
This Alphabet Spin-off Brings “Fishal Recognition” to Aquaculture (IEEE Spectrum)
Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.
Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices
This week, Dave speaks with Max Gannon of Cofense Intelligence to dive into his team's research on "The Rise of Precision-Validated Credential Theft: A New Challenge for Defenders."
Threat actors continuously develop new tactics, techniques, and procedures (TTPs) to bypass existing defenses. When defenders identify these methods and implement countermeasures, attackers adapt or create more sophisticated approaches.
This research explores how cybercriminals are leveling up their credential phishing tactics using Precision-Validated Phishing, a technique that leverages real-time email validation to ensure only high-value targets receive the phishing attempt.
The research can be found here:
The Rise of Precision-Validated Credential Theft: A New Challenge for Defenders
Learn more about your ad choices. Visit megaphone.fm/adchoices
Thinking past the US 2024 Presidential Election, In part three of the series, Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses reducing the impact of propaganda in the future elections with Perry Carpenter, Chief Human Risk Management Strategist at KnowBe4 and host of the 8th Layer Insights Podcast, Nina Jankowicz, Co-Founder and CEO of the The American Sunlight Project, and Scott Small, Director of Cyber Threat Intelligence at Tidal Cyber.
Check out Part 1 & 2!
Part 1: Election Propaganda Part 1: How Does Election Propaganda Work? In this episode, Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses personal defensive measures that every citizen can take—regardless of political philosophy—to resist the influence of propaganda. This foundational episode is essential for understanding how to navigate the complex landscape of election messaging.
Part 2: Election Propaganda: Part 2: Modern propaganda efforts. In preparation for the US 2024 Presidential Election, Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses recent international propaganda efforts in the form of nation state interference and influence operations as well as domestic campaigns designed to split the target country into opposing camps. Guests include Nina Jankowicz, Co-Founder and CEO of the The American Sunlight Project and Scott Small, Director of Cyber Threat Intelligence at Tidal Cyber.
References:
Rick Howard, 2024. Election Propaganda Part 1: How does election propaganda work? [3 Part Podcast Series]. The CyberWire.
Rick Howard, 2024. Election Propaganda: Part 2: Modern propaganda efforts. [3 Part Podcast Series]. The CyberWire.
Christopher Chabris, Daniel Simons, 2010. The Invisible Gorilla: And Other Ways Our Intuitions Deceive Us [Book]. Goodreads.
Chris Palmer, 2010. TFL Viral - Awareness Test (Moonwalking Bear) [Explainer]. YouTube.
David Ehl, 2024. Why Meta is now banning Russian propaganda [News]. Deutsche Welle.
Eli Pariser, 2011. The Filter Bubble: What the Internet is Hiding From You [Book]. Goodreads.
Kara Swisher, Julia Davis, Alex Stamos, Brandy Zadrozny, 2024. Useful Idiots? How Right-Wing Influencers Got $ to Spread Russian Propaganda [Podcast]. On with Kara Swisher.
Nate Silver, 2024. What’s behind Trump’s surge in prediction markets? [Analysis]. Silver Bulletin.
Niha Masih, 2024. Meta bans Russian state media outlet RT for acts of ‘foreign interference’ [News]. The Washington Post.
Nilay Patel, 2024. The AI election deepfakes have arrived [Podcast]. Decoder.
Nina Jankowicz, 2020. How to Lose the Information War: Russia, Fake News and the Future of Conflict [Book]. Goodreads.
Perry Carpenter, 2024. FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions [Book]. Goodreads.
Perry Carpenter, 2021. Meatloaf Recipes Cookbook: Easy Recipes For Preparing Tasty Meals For Weight Loss And Healthy Lifestyle All Year Round [Book]. Goodreads.
Perry Carpenter, n.d. 8th Layer Insights [Podcast]. N2K CyberWire.
Renee DiResta, 2024. Invisible Rulers: The People Who Turn Lies into Reality [Book]. Goodreads.
Robin Stern, Marc Brackett, 2024. 5 Ways to Recognize and Avoid Political Gaslighting [Explainer]. The Washington Post.
Sarah Ellison, Amy Gardner, Clara Ence Morse, 2024. Elon Musk’s misleading election claims reach millions and alarm election officials [News]. The Washington Post.
Scott Small, 2024. Election Cyber Interference Threats & Defenses: A Data-Driven Study [White Paper]. Tidal Cyber.
Staff, n.d. Overview: Coalition for Content Provenance and Authenticity [Website]. C2PA.
Staff, 2021. Foreign Threats to the 2020 US Federal Elections [Intelligence Community Assessment]. DNI.
Staff, n.d. Project Origin [Website]. OriginProject. URL https://www.originproject.info/
Stuart A. Thompson, Tiffany Hsu, 2024. Left-Wing Misinformation Is Having a Moment [Analysis] The New York Times.
Learn more about your ad choices. Visit megaphone.fm/adchoices
In preparation for the US 2024 Presidential Election, Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses recent international propaganda efforts in the form of nation state interference and influence operations as well as domestic campaigns designed to split the target country into opposing camps. Guests include Nina Jankowicz, Co-Founder and CEO of the The American Sunlight Project and Scott Small, Director of Cyber Threat Intelligence at Tidal Cyber.
Check out Part 1!
Make sure to check out Election Propaganda Part 1: How Does Election Propaganda Work? In this episode, Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses personal defensive measures that every citizen can take—regardless of political philosophy—to resist the influence of propaganda. This foundational episode is essential for understanding how to navigate the complex landscape of election messaging.
References:
Scott Small, 2024. Election Cyber Interference Threats & Defenses: A Data-Driven Study [White Paper]. Tidal Cyber.
Renee DiResta, 2024. Invisible Rulers: The People Who Turn Lies into Reality [Book]. Goodreads.
Nina Jankowicz, 2020. How to Lose the Information War: Russia, Fake News and the Future of Conflict [Book]. Goodreads.
Learn more about your ad choices. Visit megaphone.fm/adchoices
Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses personal defensive measures that an average citizen, regardless of political philosophy, can take in order to not succumb to propaganda.
References:
David Ehl, 2024. Why Meta is now banning Russian propaganda [News]. Deutsche Welle.
Jeff Berman, Renée DiResta, 2023. Disinformation & How To Combat It [Interview]. Youtube.
Niha Masih, 2024. Meta bans Russian state media outlet RT for acts of ‘foreign interference’ [News]. The Washington Post.
Quentin Hardy, Renée DiResta, 2024. The Invisible Rulers Turning Lies Into Reality [Interview]. YouTube.
Rob Tracinski, Renée DiResta, 2024. The Internet Rumor Mill [Interview]. YouTube.
Robin Stern, Marc Brackett, 2024. 5 Ways to Recognize and Avoid Political Gaslighting [Explainer]. The Washington Post.
Sarah Ellison, Amy Gardner, Clara Ence Morse, 2024. Elon Musk’s misleading election claims reach millions and alarm election officials [News]. The Washington Post.
Scott Small, 2024. Election Cyber Interference Threats & Defenses: A Data-Driven Study [White Paper]. Tidal Cyber.
Staff, 2021. Foreign Threats to the 2020 US Federal Elections [Intelligence Community Assessment]. DNI.
Staff, 2024. Election Cyber Interference Threats & Defenses: A Data-Driven Study [White Paper]. Tidal.
Stuart A. Thompson, Tiffany Hsu, 2024. Left-Wing Misinformation Is Having a Moment [Analysis. The New York Times.
Stuart A. Thompson, 2024. Elon Musk’s Week on X: Deepfakes, Falsehoods and Lots of Memes [News]. The New York Times.
Will Oremus, 2024. Zuckerberg expresses regrets over covid misinformation crackdown [News]. The Washington Post.
Yascha Mounk, Renée DiResta, 2022. How (Not) to Fix Social Media [Interview]. YouTube.
Renee DiResta, 2024. Invisible Rulers: The People Who Turn Lies into Reality [Book]. Goodreads.
Nina Jankowicz, 2020. How to Lose the Information War: Russia, Fake News and the Future of Conflict [Book]. Goodreads.
Learn more about your ad choices. Visit megaphone.fm/adchoices
Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, turns over hosting responsibilities to Errol Weiss, the Chief Security Officer (CSO) of the HEALTH-ISAC and one of the original contributors to the N2K CyberWire Hash Table. He will make the business case for information sharing.
References:
White and Williams LLP, Staff Osborne Clarke LLP , 2018. Threat Information Sharing and GDPR [Legal Review]. FS-ISAC.
Senator Richard Burr (R-NC), 2015. S.754 - 114th Congress (2015-2016): To improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes [Law]. Library of Congress.
Staff, n.d. National Council of ISACs [Website]. NCI.
Staff, 2020. Guidance to Assist Non-Federal Entities to Share Cyber Threat Indicators and Defensive Measures with Federal Entities under the Cybersecurity Information Sharing Act of 2015 [Guidance]. CISA.
Staff, 2023. Information Sharing Best Practices [White paper]. Health-ISAC.
Learn more about your ad choices. Visit megaphone.fm/adchoices
International law enforcement take down the Breachforums domains. Researchers link exploitation campaigns targeting Cisco, Palo Alto Networks, and Fortinet. Juniper Networks patches over 200 vulnerabilities. Apple and Google update their bug bounties. Evaluating AI use in application security (AppSec) programs. Microsegmentation can contain ransomware much faster and yield better cyber insurance terms. The new RondoDox botnet exploits over 50 vulnerabilities. Researchers tag 13 unpatched Ivanti Endpoint Manager flaws. Our guest is Jason Manar, CISO of Kaseya, sharing his insight into how the private and public sectors can work together for national security. Hackers mistake a decoy for glory.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.
CyberWire Guest
Today we are joined by Jason Manar, CISO of Kaseya, sharing his insight into how the private and public sectors can/must work together for national security.
Selected Reading
FBI takes down BreachForums portal used for Salesforce extortion (Bleeping Computer)
Cisco, Fortinet, Palo Alto Networks Devices Targeted in Coordinated Campaign (SecurityWeek)
Juniper Networks Patches Critical Junos Space Vulnerabilities (OffSeq)
Apple Announces $2 Million Bug Bounty Reward for the Most Dangerous Exploits (WIRED)
Google Launches AI Bug Bounty with $30,000 Top Reward (Infosecurity Magazine)
In AI We Trust? Increasing AI Adoption in AppSec Despite Limited Oversight (Fastly)
Reducing Risk: Microsegmentation Means Faster Incident Response, Lower Insurance Premiums for Organizations (Akamai)
RondoDox Botnet Takes ‘Exploit Shotgun’ Approach (SecurityWeek)
ZDI Drops 13 Unpatched Ivanti Endpoint Manager Vulnerabilities (SecurityWeek)
Pro-Russian hackers caught bragging about attack on fake water utility (The Record)
Share your feedback.
What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.
Want to hear your company in the show?
N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices
DHS reassigns cyberstaff to immigration duties. A massive DDoS attack disrupts several major gaming platforms. Discord refuses ransom after a third-party support system breach. Researchers examine Chaos ransomware and creative log-poisoning web intrusions. The FCC reconsiders its telecom data breach disclosure rule. Experts warn of teen recruitment in pro-Russian hacking operations. Ukraine’s parliament approves the establishment of Cyber Forces. Troy Hunt criticizes data breach injunctions as empty gestures. Our guest is Sarah Graham from the Atlantic Council’s Cyber Statecraft Initiative (CSI) discussing their report, "Mythical Beasts: Diving into the depths of the global spyware market." And, Spy Dog’s secret site goes off leash.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.
CyberWire Guest
Sarah Graham from the Atlantic Council’s Cyber Statecraft Initiative (CSI) discussing their work and findings on "Mythical Beasts: Diving into the depths of the global spyware market."
Selected Reading
Homeland Security Cyber Personnel Reassigned to Jobs in Trump’s Deportation Push (Bloomberg)
Massive DDoS Attack Knocks Out Steam, Riot, and Other Services (Windows Report)
Hackers claim Discord breach exposed data of 5.5 million users (Bleeping Computer)
The Evolution of Chaos Ransomware: Faster, Smarter, and More Dangerous (FortiGuard Labs)
The Crown Prince, Nezha: A New Tool Favored by China-Nexus Threat Actors (Huntress)
Court Pauses FCC Data Breach Rules as Agency Takes New Look | Regulation (Cablefax)
Arrests Underscore Fears of Teen Cyberespionage Recruitment (Data Breach Today)
Ukraine's parliament backs creation of cyber forces in first reading (The Kyiv Independent)
Troy Hunt: Court Injunctions are the Thoughts and Prayers of Data Breach Response (Troy Hunt)
Spy Dog: Children's books pulled over explicit weblink (BBC News)
Share your feedback.
What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.
Want to hear your company in the show?
N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices
Chinese hackers infiltrate a major U.S. law firm. The EU Commission President warns Russia is waging a hybrid war against Europe. Researchers say LoJax is the latest malware from Russia’s Fancy Bear. Salesforce refuses ransom demands. London Police arrest two teens over an alleged ransomware attack on a preschool. Microsoft tightens Windows 11 setup restrictions. SINET and DataTribe spotlight 2025 cybersecurity innovators. On our Industry Voices segment, we are joined by Sean Deuby, Semperis Principal Technologist, discussing identity system security and the growth of the HIP Conference. Employees overshare with ChatGPT.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.
CyberWire Guest
On our Industry Voices segment, we are joined by Sean Deuby, Semperis Principal Technologist, discussing identity system security and the growth of the HIP Conference while highlighting some of the keynotes and presentations. If you want to hear the full conversation, you can tune in here.
Selected Reading
Chinese Hackers Said to Target U.S. Law Firms (The New York Times)
Russia is at ‘hybrid war’ with Europe, warns EU chief, calling for members ‘to take it very seriously’ (The Record)
What you need to know about “LoJax”, the new, stealthy malware from Fancy Bear (ESET)
Salesforce refuses to pay ransom over widespread data theft attacks (Bleeping Computer)
Teens arrested in London preschool ransomware attack (The Register)
Microsoft kills more Microsoft Account bypasses in Windows 11 (Bleeping Computer)
SINET Announces the 2025 SINET16 Innovator Awards (BusinessWire)
DataTribe Announces Finalists for Eighth Annual Cybersecurity Startup Challenge (DataTribe)
Employees regularly paste company secrets into ChatGPT (The Register)
One-man spam campaign ravages EU ‘chat control’ bill (POLITICO)
Share your feedback.
What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.
Want to hear your company in the show?
N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices
Microsoft tags a critical vulnerability in Fortra’s GoAnywhere software. A critical Redis vulnerability could allow remote code execution. Researchers tie BIETA to China’s MSS technology enablement. Competing narratives cloud the Oracle E-Business Suite breach. An Ohio-based vision care firm will pay $5 million to settle phishing-related data breach claims. “Trinity of Chaos” claims to be a new ransomware collective. LinkedIn files a lawsuit against an alleged data scraper. This year’s Nobel Prize in Physics recognizes pioneering research into quantum mechanical tunneling. On today’s Industry Voices segment, we are joined by Alastair Paterson from Harmonic Security, discussing shadow AI and the new era of work. Australia’s AI-authored report gets a human rewrite.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.
CyberWire Guest
On today’s Industry Voices segment, we are joined by Alastair Paterson, CEO and Co-Founder of Harmonic Security, discussing shadow AI and the new era of work. You can hear the full conversation with Alastair here.
Selected Reading
Microsoft: Critical GoAnywhere Bug Exploited in Medusa Ransomware Camp (Infosecurity Magazine)
Redis warns of critical flaw impacting thousaRends of instances (Bleeping Computer)
BIETA: A Technology Enablement Front for China's MSS (Recorded Future)
Well, Well, Well. It’s Another Day. (Oracle E-Business Suite Pre-Auth RCE Chain - CVE-2025-61882) (Labs)
EyeMed Agrees to Pay $5M to Settle Email Breach Litigation (Govinfo Security)
Ransomware Group “Trinity of Chaos” Launches Data Leak Site (Infosecurity Magazine)
LinkedIn sues ProAPIs for using 1M fake accounts to scrape user data (Bleeping Computer)
The Nobel Prize for physics is awarded for discoveries in quantum mechanical tunneling (NPR)
Deloitte refunds Australian government over AI in report (The Register)
Share your feedback.
What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.
Want to hear your company in the show?
N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.
The CyberWire Daily podcast is a production of N2K Networks, your source for critical industry insights, strategic intelligence, and performance-driven learning products. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices
A critical zero-day in Oracle E-Business Suite is under active exploitation. ICE plans a major expansion of its social media surveillance operations. Discord confirms a third-party data breach. A critical vulnerability in the Unity game engine could allow arbitrary code execution. New variants of the XWorm remote access trojan spread through phishing campaigns. Researchers uncover a critical command injection flaw in Dell UnityVSA storage appliances. There’s been a sharp surge in reconnaissance scans targeting Palo Alto Networks login portals. A new hacking competition offers $4.5 million in prizes for exploits targeting major cloud and AI software. Monday Business Brief. On our Afternoon Cyber Tea segment with Microsoft’s Ann Johnson, Ann and guest Volker Wagner, Chief Information Security Officer at BASF, share some Lessons from the Frontlines of Industrial Security. Don’t spend that ParkMobile settlement all in one place.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.
Afternoon Cyber Tea Segment
Today we are highlighting Afternoon Cyber Tea with Ann Johnson. Ann and guest Volker Wagner, Chief Information Security Officer at BASF, share some Lessons from the Frontlines of Industrial Security. You can listen to Ann and Volker's full conversation here and catch new episodes of Afternoon Cyber Tea every other Tuesday on your favorite podcast app.
Selected Reading
PoC Exploit Released for Remotely Exploitable Oracle E-Business Suite 0-Day Vulnerability (Cyber Security News)
ICE Wants to Build Out a 24/7 Social Media Surveillance Team (WIRED)
Discord blames third-party support outfit for data breach (The Register)
Android and Windows gamers worldwide potentially affected by bug in Unity game engine (The Record)
XWorm malware resurfaces with ransomware module, over 35 plugins (Bleeping Computer)
Patch Now: Dell UnityVSA Flaw Allows Command Execution Without Login (HackRead)
Scanning of Palo Alto Portals Surges 500% (Infosecurity Magazine)
$4.5 Million Offered in New Cloud Hacking Competition (SecurityWeek)
Accenture acquires Japanese AI and DX provider, Aidemy Inc. (N2K Pro Business Briefing)
ParkMobile pays... $1 each for 2021 data breach that hit 22 million (Bleeping Computer)
Vote for Dave!
Share your feedback.
What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.
Want to hear your company in the show?
N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices
The DataTribe Challenge is a launchpad for elite cybersecurity and cyber-adjacent startups ready to break out. 2025 marks the 8th annual edition of the event with a change in venue and some exciting new updates.
We take you on a journey from inception with Leo Scott, Managing Director and Chief Innovation Officer at DataTribe, and 3 past DataTribe Challenge winners at different levels on their growth tracks following their participation in the event. You'll meet Anita D'Amico, former CEO of Code DX (acquired by Synopsis in 2021) and 2019 winner; Greg Baker, Co-Founder of Balance Theory and 2022 winner; and Brian Proctor, Founder and CEO of Frenos and 2024 winner.
Learn more about your ad choices. Visit megaphone.fm/adchoices
A fast-spreading malware campaign is abusing WhatsApp as both lure and launchpad. Carmaker Renault suffers a data breach. DrayTek patches a critical router flaw. CISA alerts cover a range of vulnerabilities. A new phishing kit lowers the bar for convincing lures. A Catholic hospital network pays $7.6 million to settle data breach litigation. A major breach at FEMA exposes employee data. Google expands Gmail’s end-to-end encryption (E2EE) capabilities. On our Industry Voices segment, we are joined by Brian Vecci, Field CTO at Varonis, discussing move fast but don’t break things: Innovating at light speed without putting data at risk. The UK’s digital ID is a solution in search of a mandate.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.
CyberWire Guest
On our Industry Voices segment, we are joined by Brian Vecci, Field CTO at Varonis, discussing move fast but don’t break things: Innovating at light speed without putting data at risk. You can listen to Brian’s full conversation here.
Selected Reading
Threat Actors Leveraging WhatsApp Messages to Attack Windows Systems With SORVEPOTEL Malware (Cybersecurity News)
Major car maker confirms customer data stolen in cyber attack (The Independent)
Unauthenticated RCE Flaw Patched in DrayTek Routers (SecurityWeek)
Organizations Warned of Exploited Meteobridge Vulnerability (SecurityWeek)
CISA Releases Two Industrial Control Systems Advisories (CISA.gov)
New ‘point-and-click’ phishing kit simplifies malicious attachment creation (SC Media)
Hospital Chain to Pay $7.6M to Settle Breach Litigation (Bank Inforsecurity)
FEMA cyber breach exposes employee data (SC Media)
Gmail business users can now send encrypted emails to anyone (Bleeping Computer)UK government says digital ID won't be compulsory – honest (The Register)
Share your feedback.
What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.
Want to hear your company in the show?
N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices
CISA furloughs most of its workforce due to the government shutdown. The U.S. Air Force confirms it is investigating a SharePoint related breach. Google warns of a large-scale extortion campaign targeting executives. Researchers uncover Android spyware campaigns disguised as popular messaging apps. An extortion group claims to have breached Red Hat’s private GitHub repositories. A software provider for recreational vehicle and power sport dealers suffers a ransomware breach. Patchwork APT deploys a new Powershell loader using scheduled tasks for persistence. A Tennessee Senator urges aggressive U.S. action to prepare for a post-quantum future. Cynthia Kaiser, SVP of Halcyon’s Ransomware Research Center and former Deputy Assistant Director at the FBI’s Cyber Division, joins us with insights on the government shutdown. A Malaysian man pleads guilty to supporting a massive crypto fraud. Protected health info is not a marketing tool.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.
CyberWire Guest
Cynthia Kaiser, SVP of Halcyon’s Ransomware Research Center and former Deputy Assistant Director at the FBI’s Cyber Division, joins us with insights on the government shutdown.
Selected Reading
Shutdown guts U.S. cybersecurity agency at perilous time (CISA)
Air Force admits SharePoint privacy issue; reports of breach (The Register)
Google warns executives are being targeted for extortion with leaked Oracle data (IT Pro)
Researchers uncover spyware targeting messaging app users in the UAE (The Record)
Red Hat confirms security incident after hackers claim GitHub breach (Bleeping Computer)
766,000 Impacted by Data Breach at Dealership Software Provider Motility (Security Week)
Patchwork APT: Leveraging PowerShell to Create Scheduled Tasks and Deploy Final Payload (GB Hackers)
GOP senator confirms pending White House quantum push, touts legislative alternatives (CyberScoop)
Bitcoin Fixer Convicted for Role in Money Laundering Scheme (Bank Infosecurity)Nursing Home Fined $182K for Posting Patient Photos Online (Bank Infosecurity)
Share your feedback.
What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.
Want to hear your company in the show?
N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices
Major federal cybersecurity programs expire amidst the government shutdown. Global leaders and experts convene in Riyadh for the Global Cybersecurity Forum. NIST tackles removable media. ICE buys vast troves of smartphone location data. Researchers claim a newly patched VMware vulnerability has been a zero-day for nearly a year. ClickFix-style attacks surge and spread across platforms. Battering RAM defeats memory encryption and boot-time defenses. A new phishing toolkit converts ordinary PDFs into interactive lures. A trio of breaches exposes data of 3.7 million across North America. Tim Starks from CyberScoop unpacks a report from Senate Democrats on DOGE. The Lone Star State proves even the internet isn’t bulletproof.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.
CyberWire Guest
Tim Starks, Senior Reporter from CyberScoop, is back and joins Dave to discuss a report from Senate Democrats on the Department of Government Efficiency (DOGE). You can read Tim’s article on the subject here.
Selected Reading
Cyber information-sharing law and state grants set to go dark as Congress stalls over funding (The Record)
Live - Global Cybersecurity Forum in Riyadh tackles how technology can shape future of cyberspace (Euronews)
NIST Publishes Guide for Protecting ICS Against USB-Borne Threats (SecurityWeek)
ICE to Buy Tool that Tracks Locations of Hundreds of Millions of Phones Every Day (404 Media)
Broadcom Fails to Disclose Zero-Day Exploitation of VMware Vulnerability (SecurityWeek)
Don’t Sweat the ClickFix Techniques: Variants & Detection Evolution (Huntress)
Battering RAM Attack Breaks Intel and AMD Security Tech With $50 Device (SecurityWeek)
New MatrixPDF toolkit turns PDFs into phishing and malware lures (Bleeping Computer)
3.7M breach notification letters set to flood North America's mailboxes (The Register)
A Bullet Crashed the Internet in Texas (404 Media)
Share your feedback.
What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.
Want to hear your company in the show?
N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices
CISA issues an urgent warning about active exploitation of a critical vulnerability in the sudo utility. Broadcom patches two high-severity vulnerabilities in VMware NSX. South Korea raises its national cyber threat level after a datacenter fire. Formbricks patches a critical token validation flaw. Microsoft blocks a credential phishing campaign that made use of malicious SVG files. Landlords are accused of scraping sensitive payroll data. Cybercriminals lay the groundwork for large-scale FIFA fraud. Burnout takes a heavy toll on cybersecurity professionals. On our Threat Vector segment, host David Moulton is joined by Kyle Wilhoit talking about the evolution of hacker culture and cybersecurity. London police bag the biggest bitcoin bust.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.
CyberWire Guest
On this Threat Vector segment, host David Moulton is joined by Kyle Wilhoit of Unit 42 talking about the evolution of hacker culture and cybersecurity. You can listen to the full conversation here, and catch new episodes of Threat Vector each Thursday in your podcast app of choice.
Selected Reading
CISA Issues Alert on Active Exploitation of Linux and Unix Sudo Flaw (GB Hackers)
Broadcom fixes high-severity VMware NSX bugs reported by NSA (Bleeping Computer)
South Korea raises cyber threat level after huge data centre fire sparks hacking fears (The Guardian)
JWT signature verification bypass enables account takeover in Formbricks (Beyond Machines)
Microsoft Flags AI Phishing Attack Hiding in SVG Files (Hackread)
Landlords Demand Tenants’ Workplace Logins to Scrape Their Paystubs (404 Media)
Playing Offside: How Threat Actors Are Warming Up for FIFA 2026 (Check Point Blog)
Why burnout is a growing problem in cybersecurity (BBC)
Chinese woman convicted after 'world's biggest' bitcoin seizure (BBC)
Share your feedback.
What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.
Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices
A Chinese state-sponsored group exploited enterprise devices in a global espionage effort. The UK Government guarantees £1.5 billion financing to help Jaguar Land Rover’s recovery efforts. A maximum-severity flaw in Fortra’s GoAnywhere Managed File Transfer product is under active exploitation. The AI boom faces sustainability questions. Akira ransomware bypasses MFA on SonicWall devices. Dutch teens are arrested for allegedly spying for Russia. Luxury retailer Harrods confirms a data breach. An Interpol crackdown targets African cybercrime rings. We’ve got our Monday business briefing. Brandon Karpf joins us to discuss the cybersecurity ecosystem in Japan. Cyber crooks offer a BBC journalist an early retirement package.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.
CyberWire Guest
Today our guest is Brandon Karpf, friend of the show, and he joins to discuss the Cybersecurity ecosystem in Japan.
Selected Reading
Chinese hackers breached critical infrastructure globally using enterprise network gear (CSO Online)
UK government bails out Jaguar Land Rover with $2 billion loan (Metacurity)
Maximum severity GoAnywhere MFT flaw exploited as zero day (Bleeping Computer)
The AI boom is unsustainable unless tech spending goes ‘parabolic,’ Deutsche Bank warns: ‘This is highly unlikely’ (Fortune)
Akira ransomware breaching MFA-protected SonicWall VPN accounts (Bleeping Computer)
Dutch teens arrested for trying to spy on Europol for Russia (Bleeping Computer)
Harrods: Hackers contact firm after 430,000 customer records stolen (BBC)
Africa cybercrime crackdown includes hundreds of arrests, Interpol says (The Record)
Cyberbit acquires RangeForce. Terra Security raises $30 million. (N2K Pro)
'You'll never need to work again': Criminals offer reporter money to hack BBC (BBC)
Share your feedback.
What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.
Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices
CISA gives federal agencies 24 hours to patch a critical Cisco firewall bug. Researchers uncover the first known malicious MCP server used in a supply chain attack. The New York SIM card threat may have been overblown. Microsoft tags a new variant of the XCSSET macOS malware. An exposed auto insurance claims database puts PII at risk. Amazon will pay $2.5 billion to settle dark pattern allegations. Researchers uncover North Korea’s hybrid playbook of cybercrime and insider threats. An old Hikvision security camera vulnerability rears its ugly head. Dan Trujillo from the Air Force Research Laboratory’s Space Vehicles Directorate joins Maria Varmazis, host of T-Minus Space Daily to discuss how his team is securing satellites and space systems from cyber threats. DOGE delivers dysfunction, disarray, and disappointment.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.CyberWire Guest
Dan Trujillo from the Air Force Research Laboratory’s Space Vehicles Directorate joins Maria Varmazis, host of T-Minus Space Daily to discuss how his team is securing satellites and space systems from cyber threats and also shares advice for breaking into the fast-growing field of space cybersecurity
Selected Reading
Federal agencies given one day to patch exploited Cisco firewall bugs (The Record)
First malicious MCP Server discovered, stealing data from AI-Powered email systems (Beyond Machines)
Secret Service faces backlash over SIM farm bust as experts challenge threat claims (Metacurity)
Microsoft warns of new XCSSET macOS malware variant targeting Xcode devs (Bleeping Computer)
Microsoft cuts off cloud services to Israeli military unit after report of storing Palestinians' phone calls (CNBC)
Auto Insurance Platform Exposed Over 5 Million Records Including Documents Containing PII (Website Planet)
Amazon pays $2.5 billion to settle Prime memberships lawsuit (Bleeping Computer)
DeceptiveDevelopment: From primitive crypto theft to sophisticated AI-based deception (We Live Security)
Critical 8 years old Hikvision Camera flaw actively exploited again (Beyond Machines)
The Story of DOGE, as Told by Federal Workers (WIRED)
Share your feedback.
What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.
Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices
Fortra flags a critical flaw in its GoAnywhere Managed File Transfer (MFT) solution. Cisco patches a critical vulnerability in its IOS and IOS XE software. Cloudflare thwarts yet another record DDoS attack. Rhysida ransomware gang claims the Maryland Transit cyberattack. The new “Obscura” ransomware strain spreads via domain controllers. Retailers’ use of generative AI expands attack surfaces. Researchers expose GitHub Actions misconfigurations with supply chain risk. Mandiant links the new BRICKSTORM backdoor to a China-based espionage campaign. Kansas students push back against an AI monitoring tool. Ben Yelin speaks with Michele Kellerman, Cybersecurity Engineer for Air and Missile Defense at Johns Hopkins University Applied Physics Lab, discussing Women's health apps and the legal grey zone that they create with HIPAA. Senators push the FTC to regulate your brainwaves.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.
CyberWire Guest
Ben Yelin, co-host of Caveat, is speaking with Michele Kellerman, Cybersecurity Engineer for Air and Missile Defense at Johns Hopkins University Applied Physics Lab, about Women's health apps and the legal grey zone that they create with HIPAA. If you want to hear the full conversation, check it out on Caveat, here.
Selected Reading
Critical CVSS 10 Flaw in GoAnywhere File Transfer Threatens 20,000 Systems (HackRead)
Cisco IOS and IOS XE Software SNMP Denial of Service and Remote Code Execution Vulnerability (Cisco)
Cloudflare mitigates new record-breaking 22.2 Tbps DDoS attack (Bleeping Computer)
Ransomware gang known for government attacks claims Maryland transit incident (The Record)
Obscura, an obscure new ransomware variant (Bleeping Computer)
Threat Labs Report: Retail 2025 (Netskope)
pull_request_nightmare Part 1: Exploiting GitHub Actions for RCE and Supply Chain Attacks (Orca)
China-linked hackers use ‘BRICKSTORM’ backdoor to steal IP (The Record)
AI safety tool sparks student backlash after flagging art as porn, deleting emails (The Washington Post)
Senators introduce bill directing FTC to establish standards for protecting consumers’ neural data (The Record)
Share your feedback.
What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.
Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices
Personalized bet builders, early cash-out, odds alerts, and multi-language support elevate a platform from decent to outstanding. When a site empowers users with customization tools, it enhances long-term engagement and betting control. https://sportbetworld.com/
AI chatbots, it’s easier than ever to experience the latest AI technology. Whether you have a simple question or want to learn more about artificial intelligence, you can start right now. Try AI Chat and explore the many benefits this technology offers, at no cost and with no registration required. The future of interaction is here – and it begins with a conversation with AI. https://chatnederlands.nl/
Loved this post! チャットGPT日本語 is a fantastic tool for getting useful information.
Informative post, Chat GPT is a must-try for accurate details.
The steps you shared are very detailed and helpful! https://quikdraw.io
Upgrade your web application firewall with https://www.modshieldsb.com/
career notes episodes are usually useless spam, never listen anymore
toxic podcast episode
I'm grateful for you, it's a nice podcast. Writing such assignments is a true struggle for me. Furthermore, I believe that everyone will eventually run into difficulties finishing their homework. As a result, in this situation, having a trustworthy provider that can assist is necessary https://us.masterpapers.com/ I came into this source and continue to use it. It aids in timely and effective preparation, even for the most challenging assignments.
The integration of human-like features in ChatGPT is intriguing. The diverse topics discussed are relevant and informative, including cyber threats and communication strategies. Experience ChatGPT now at https://gptjp.net/
That's right, ChatGPT is becoming more and more human-like. You can explore ChatGPT for free in Polish with ChatGPT po Polsku at https://chatgptpl.com/
I really enjoy this useful conversation, but at the end of the day: i should loud say: fu**k Israel
these Career Notes episodes are absolutely awful and the people presented have little merit and aren't interesting. Other than these, great podcast.
this guy is a Jedi
I've been hard at it all night trying to trace how this happened but I fear I'm only gonna make the problem worse due to my inexperienced
any chance yell could help me
I sure hope he had a great time contributing to innocent Palestinian deaths!
.k. ti. lm j . . . m.p nm w m .. p ..n n. k .u nm o
Re: Ransom DDoS episode... not only did that dude mispronounce technology names (indicating lack of technical knowledge), he used the phrase “or their [law enforcement counterparts] in other civilized countries”. In saying this, he effectively implies that hackers who write in broken English are savages from uncivilized countries. The implicit racial connotations in making a statement like that are seriously offensive (equating being ‘civilized’ with speaking English well). Really surprising and disappointing.
✌Deb.