CyberWire Daily cover image

CyberWire Daily

Latest episodes

undefined
Feb 10, 2025 • 31min

Read all about it—or maybe not.

Mike Woodard, VP of Product Management for App Security at Digital.ai, shares insights on minimizing risks when deploying AI in cybersecurity. He discusses the importance of vendor vetting and legal compliance, as well as the evolving landscape of cyber threats. The conversation highlights cybersecurity challenges such as a significant cyberattack on newspapers and the need for quantum-safe technology. Woodard also provides practical tips for secure Wi-Fi passwords, showcasing the critical balance between leveraging AI's benefits and ensuring data protection.
undefined
Feb 9, 2025 • 8min

Avi Shua: Try to do things by yourself. [CEO] [Career Notes]

Avi Shua, CEO and co-founder of Orca Security, inspires listeners with his journey from a curious teen hacktivist to a cybersecurity leader. He shares insights from his unique training with the Israeli Army's Intelligence Unit 8200, emphasizing the value of independent problem-solving. Avi advocates for simplifying cybersecurity practices so that professionals can focus on their core responsibilities, while also encouraging newcomers to find their passion in the field. His vision aims to elevate security work beyond mere troubleshooting.
undefined
20 snips
Feb 8, 2025 • 22min

Cleo’s trojan horse. [Research Saturday]

Mark Manglicmot, SVP of Security Services at Arctic Wolf, is a cybersecurity expert who dives into the Cleopatra mass exploitation campaign. He discusses the alarming use of a Java backdoor, which attackers deploy via PowerShell stagers, exploiting vulnerabilities in Cleo's MFT software. Mark highlights the ongoing challenges in cybersecurity, emphasizing the need for proactive measures and vigilance against evolving threats. He also stresses the importance of software updates and robust vulnerability management to fend off sophisticated tactics like those used in the Cleopatra campaign.
undefined
Feb 7, 2025 • 37min

DOGE-eat-DOGE world.

John Anthony Smith, Founder and Chief Security Officer at Fenix24, dives into the world of cyber resilience and the importance of data backups. He discusses the rise of AI-related security concerns, including vulnerabilities in popular platforms like DeepSeek and Microsoft Outlook. The conversation highlights the risks of phishing campaigns and emerging threats from malicious machine learning models. Smith emphasizes the need for preparedness and proper testing to combat modern cyber threats, making a compelling case for organizations to rethink their security strategies.
undefined
16 snips
Feb 6, 2025 • 44min

FCC around and find out.

Cliff Crosland, CEO and co-founder of Scanner.dev, shares insights on the evolving landscape of cybersecurity from a data management perspective. He delves into the concept of security data lakes, emphasizing their role in threat hunting and response. The discussion highlights the advantages of a 'bring your own' model, allowing organizations greater control over their data while utilizing vendor tools. With ransomware attacks declining, Crosland also touches on the importance of maintaining resilience and integrating innovative tools to navigate modern security challenges.
undefined
10 snips
Feb 5, 2025 • 33min

DOGE days numbered?

The DOGE team is under fire as the cryptocurrency market evolves. There's critical news about a macOS vulnerability allowing serious exploits. CISA has released new advisories for industrial control systems. Cybersecurity job shortages are stirring legislative responses. Google’s take on AI ethics shifts amidst global tensions. And for those eyeing career growth, there are insights on mastering crucial cybersecurity certifications. All this and more keeps listeners on the cutting edge of digital security!
undefined
11 snips
Feb 4, 2025 • 33min

A wolf in DOGE’s clothing?

Concerns arise as DOGE gains unchecked access to federal networks, sparking cybersecurity fears. Senator Hawley's AI ban raises free speech issues while Apple faces a massive data exposure. North Korean malware cleverly targets job seekers on macOS. The latest Android security update addresses multiple vulnerabilities, and a Grubhub breach reveals personal data risks. Texas prepares to launch its Cyber Command amidst rising threats. Lastly, the vulnerabilities of new AI models like DeepSeek come under scrutiny, highlighting the need for cautious adoption.
undefined
13 snips
Feb 3, 2025 • 32min

Federal agencies in power struggle crossfire.

Tim Starks, Senior Reporter at CyberScoop, dives into the intense power struggles among federal agencies over cybersecurity. He discusses XE Group's shift from skimming to exploiting zero-day vulnerabilities and highlights WhatsApp's discovery of a zero-click spyware attack. Starks also examines the implications of Texas's ban on certain AI apps and significant data breaches affecting millions. With updates on critical vulnerabilities from NVIDIA and ARM, he sheds light on the urgent need for robust cybersecurity amidst rising threats.
undefined
8 snips
Feb 2, 2025 • 7min

Margaret Cunningham: A people scientist with a technology focus. [Behavioral science} [Career Notes]

Discover the fascinating journey of a principal research scientist who transitioned from aspiring English professor to a leader in cybersecurity. Explore her insights on how human behavior impacts technology and the importance of continuous learning. Learn about her role at the Department of Homeland Security, focusing on human systems integration and performance measurement. Margaret shares her belief in creating champions for human behavior in tech, emphasizing the significance of networking and keeping updated in this ever-evolving field.
undefined
9 snips
Feb 1, 2025 • 27min

A Digital Eye on supply-chain-based espionage attacks. [Research Saturday]

Juan Andres Guerrero-Saade, a security researcher at SentinelOne's SentinelLabs, discusses the alarming tactics used in Operation Digital Eye, where a Chinese threat actor targets critical digital infrastructure. He reveals the use of Visual Studio Code Tunnels and sophisticated methods like SQL injection. The conversation also dives into the complexities of Chinese APT dynamics, emphasizing the need for robust endpoint protection against supply-chain attacks. Guerro-Saade warns about the vulnerabilities within development tools and the rise in cyber espionage activities across Europe.

Get the Snipd
podcast app

Unlock the knowledge in podcasts with the podcast player of the future.
App store bannerPlay store banner

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode

Save any
moment

Hear something you like? Tap your headphones to save it with AI-generated key takeaways

Share
& Export

Send highlights to Twitter, WhatsApp or export them to Notion, Readwise & more

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode