CyberWire Daily cover image

CyberWire Daily

Latest episodes

undefined
Mar 13, 2025 • 35min

FCC draws the line on Chinese tech threats.

The FCC looks to counter Chinese cyber threats. Turmoil at CISA. Volt Typhoon infiltrated a power utility for over 300 days. Europe takes the lead at Ukraine’s annual cyber conference. Facebook discloses a critical vulnerability in FreeType. A new Android spyware infiltrated the Google Play store. Our guest is Alvaro Alonso Ruiz, Co-Founder and CCO of Leanspace, who is discussing software in space with T-Minus Space Daily host Maria Varmazis. A UK hospital finds thousands of unwelcome guests on their network. Remember to leave us a 5-star rating and review in your favorite podcast app.Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.CyberWire GuestToday our guest is Alvaro Alonso Ruiz, Co-Founder and CCO of Leanspace, who is discussing software in space with T-Minus Space Daily host Maria Varmazis.Selected ReadingUS communications regulator to create council to counter China technology threats (Financial Times)‘People Are Scared’: Inside CISA as It Reels From Trump’s Purge (WIRED)CISA cuts $10 million annually from ISAC funding for states amid wider cyber cuts (The Record)Arizona Secretary of State Proposes Alternative to Defunded National Election Security Program (Democracy Docket)China's Volt Typhoon Hackers Dwelled in US Electric Grid for 300 Days (SecurityWeek)Chinese cyberspies backdoor Juniper routers for stealthy access (Bleeping Computer)At Ukraine’s major cyber conference, Europe takes center stage over US (The Record)Facebook discloses FreeType 2 flaw exploited in attacks (Bleeping Computer)New North Korean Android spyware slips onto Google Play (Bleeping Computer)NHS Trust IT head: ‘Our attack surface was much bigger than we thought’ (Computing)Share your feedback.We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show?You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
undefined
Mar 12, 2025 • 32min

Will Plankey lead CISA to victory?

The White House names their nominee for CISA’s top spot. Patch Tuesday updates. Apple issues emergency updates for a zero-day WebKit vulnerability. Researchers highlight advanced MFA-bypassing techniques. North Korea's Lazarus Group targets cryptocurrency wallets and browser data. Our guest today is Rocco D’Amico of Brass Valley discussing hidden risks in retired devices and reducing data breach threats. Making sense of the skills gap paradox. Remember to leave us a 5-star rating and review in your favorite podcast app.Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.CyberWire GuestJoining us today is Rocco D’Amico of Brass Valley discussing hidden risks in retired devices and reducing data breach threats.Selected ReadingTrump nominates Sean Plankey as new CISA director (Tech Crunch)CISA worker says 100-strong red team fired after DOGE action (The Register)March 2025 Patch Tuesday: Microsoft Fixes 57 Vulnerabilities, 7 Zero-Days (Hackread)ICS Patch Tuesday: Advisories Published by CISA, Schneider Electric, Siemens (SecurityWeek)CISA Warns of Microsoft Windows Management Console (MMC) Vulnerability Exploited in Wild (Cyber Security News)Apple WebKit Zero-Day Vulnerability Actively Exploit in High Profile Cyber Attacks (Cyber Security News)Hackers Using Advanced MFA-Bypassing Techniques To Gain Access To User Account (Cyber Security News)North Korean Lazarus hackers infect hundreds via npm packages (Bleeping Computer)Welcome to the skills gap paradox (Computing)Share your feedback.We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show?You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
undefined
Mar 11, 2025 • 36min

X marks the hack.

Gerald Beuchelt, Chief Information Security Officer at Acronis, shares insights into the vital role of threat research for managed service providers. He delves into the rise of cyber threats impacting platforms like X-Twitter and the alarming risks associated with agentic AI. Beuchelt emphasizes proactive cybersecurity measures and highlights the importance of collaboration with trusted vendors to mitigate risks. He also celebrates the CyberFirst Girls Competition, underscoring the need for greater female representation in the cybersecurity field.
undefined
7 snips
Mar 10, 2025 • 37min

PHP flaw sparks global attack wave.

Errol Weiss, the Chief Security Officer at Health-ISAC and a critical infrastructure cybersecurity expert, joins the discussion to emphasize that “the cavalry isn’t coming.” He highlights the urgent need for the private sector to take charge of cybersecurity. The conversation covers alarming PHP vulnerabilities leading to real-world exploitation and a recent ransomware wave affecting Texas. Weiss also underscores the importance of improved partnerships and frameworks in enhancing cybersecurity defenses against evolving threats.
undefined
Mar 9, 2025 • 8min

Peter Baumann: Adding value to data. [CEO] [Career Notes]

Peter Baumann, CEO of ActiveNav, shares his journey from childhood experiments with electronics to spearheading data discovery solutions. He discusses how his background in electrical engineering and business shaped his entrepreneurial spirit. Baumann emphasizes the importance of managing unstructured digital data and fostering a culture of safety within teams. He also provides insights into the evolving landscape of cybersecurity and the pivotal role of data protection for organizations. A must-listen for those interested in data management!
undefined
8 snips
Mar 8, 2025 • 23min

Botnet’s back, tell a friend. [Research Saturday]

Silas Cutler, Principal Security Researcher at Censys, dives into the enigmatic Volt Typhoon and its botnet, KV. He explains how the FBI's efforts disrupted infected systems without affecting the control infrastructure, suggesting a stealthy operator behind the scenes. Analysis reveals shifts in the botnet’s control servers in response to law enforcement. The conversation also tackles the challenges of attributing cyber threats, the strategic use of U.S. hosting for disguise, and the surprising links between patent databases and cybersecurity vulnerabilities.
undefined
Mar 7, 2025 • 30min

The end of the line for Garantex.

Law enforcement shutters Garantex crypto exchange. NTT discloses breach affecting corporate customers. Malvertising campaign hits nearly a million devices. AI’s role in Canada’s next election. Scammers target Singapore’s PM in AI fraud. Botnets exploit critical IP camera vulnerability. In our International Women's Day and Women’s History Month special, join Liz Stokes as she shares the inspiring stories of women shaping the future of cybersecurity. And how did Insider threats turn a glitch into a goldmine?Remember to leave us a 5-star rating and review in your favorite podcast app.Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.CyberWire GuestIn this special International Women’s Day edition, we shine a spotlight on the incredible women in and around our network who are shaping the future of cybersecurity. Join Liz Stokes as we celebrate Selena Larson, Threat Researcher at Proofpoint, and co-host of Only Malware in the Building, Gianna Whitver, CEO & Co-Founder of the Cybersecurity Marketing Society and co-host of the Breaking Through in Cybersecurity Marketing podcast, Maria Velasquez, Chief Growth Officer & Co-Founder of the Cybersecurity Marketing Society and co-host of the Breaking Through in Cybersecurity Marketing podcast, Chris Hare, Project Management Specialist and Content Developer at N2K Networks, and host of CertByte, Ann Lang, Project Manager at N2K Networks, Jennifer Eiben, Executive Producer at N2K Networks, and Maria Varmazis, host of the T-Minus Space Daily show at N2K Networks for their achievements, resilience, and the invaluable contributions they make to keeping our digital world secure.Selected ReadingRussian crypto exchange Garantex’s website taken down in apparent law enforcement operation (The Record)Data breach at Japanese telecom giant NTT hits 18,000 companies (BleepingComputer)Malvertising campaign leads to info stealers hosted on GitHub (Microsoft)Canadian intelligence agency warns of threat AI poses to upcoming elections (The Record) Deepfakes of Singapore PM Used to Sell Crypto, Residency Program (Bloomberg) Edimax Camera Zero-Day Disclosed by CISA Exploited by Botnets (SecurityWeek)Magecart: How Akamai Protected a Global Retailer Against a Live Attack (Akamai) Cybercrime 'crew' stole $635,000 in Taylor Swift concert tickets (BleepingComputer)Share your feedback.We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show?You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
undefined
Mar 6, 2025 • 34min

From China with love (and Malware).

In this discussion, cybersecurity expert Dave Bittner sheds light on the U.S. Justice Department's charges against Chinese IT contractors for cyber espionage linked to Silk Typhoon. He explores the vulnerabilities in the IT supply chain and the challenges posed by advanced hacking groups. The conversation also dives into how innovations like passwordless security are reshaping cybersecurity. Bittner and his co-hosts address the growing impact of technologies like AI on cybercrime and underscore the critical need for robust data privacy measures.
undefined
Mar 5, 2025 • 30min

US Treasury targets darknet kingpin.

US Treasury Department sanctions Iranian national accused of running the Nemesis criminal marketplace. Hunters International threatens to leak data stolen from Tata Technologies. Apple challenges U.K.’s iCloud encryption backdoor order. UK competition regulator says no investigation into Microsoft's OpenAI partnership. Stealthy malware campaign targets the UAE's aviation and satellite industry. This week on our CertByte segment, N2K’s Chris Hare is joined by Troy McMillan to break down a question targeting the Cisco Certified Network Associate (CCNA) exam. And hackers hit the books.Remember to leave us a 5-star rating and review in your favorite podcast app.Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.CertByte SegmentWelcome to CertByte! On this bi-weekly segment hosted by Chris Hare, a content developer and project management specialist at N2K. This week, Chris is joined by Troy McMillan to break down a question targeting the Cisco Certified Network Associate (CCNA) exam, 201-301, version 1.1 exam. Today’s question comes from N2K’s Cisco Certified Network Associate (CCNA 200-301) Practice Test. According to Cisco, the CCNA is the industry’s most widely recognized and respected associate-level certification. To learn more about this and other related topics under this objective, please refer to the following resource: https://learningnetwork.cisco.com/s/article/protection-techniques-nbsp-from-wardriving-attack To get the full news to knowledge experience, learn more about our N2K Pro subscription at https://thecyberwire.com/pro. Please note: The questions and answers provided here, and on our site, are not actual current or prior questions and answers from these certification publishers or providers.Additional source: https://www.cisco.com/site/us/en/learn/training-certifications/certifications/enterprise/ccna/index.htmlSelected ReadingTreasury sanctions Iranian national behind defunct Nemesis darknet marketplace (The Record)Ransomware Group Claims Attack on Tata Technologies (SecurityWeek) Apple is challenging U.K.’s iCloud encryption backdoor order (TechCrunch)UK's competition regulator says Microsoft's OpenAI partnership doesn't qualify for investigation (TechCrunch)  Call It What You Want: Threat Actor Delivers Highly Targeted Multistage Polyglot Malware (Proofpoint)Snail Mail Fail: Fake Ransom Note Campaign Preys on Fear (GuidePoint Security)Fake police call cryptocurrency investors to steal their funds (Bitdefender)Microsoft Teams tactics, malware connect Black Basta, Cactus ransomware (Bleeping Computer)  Investigator says differing names for hacker groups, hackers studying investigative methods hinders law enforcement (CyberScoop) Share your feedback.We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show?You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
undefined
Mar 4, 2025 • 35min

CISA keeps watch on Russia.

CISA is closely monitoring Russian cyber threats while notable companies like Broadcom and Google tackle critical vulnerabilities. A ransomware attack recently impacted Palau's health ministry, revealing the urgent need for improved cybersecurity measures. Upcoming discussions will dive into IoT security risks and showcase inspiring women in the field, celebrating their contributions to cybersecurity. Additionally, the threat of deepfakes is explored, emphasizing the importance of enhanced identity verification to counter sophisticated scams.

Get the Snipd
podcast app

Unlock the knowledge in podcasts with the podcast player of the future.
App store bannerPlay store banner

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode

Save any
moment

Hear something you like? Tap your headphones to save it with AI-generated key takeaways

Share
& Export

Send highlights to Twitter, WhatsApp or export them to Notion, Readwise & more

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode