CyberWire Daily cover image

CyberWire Daily

Latest episodes

undefined
May 31, 2025 • 22min

Triofox and the key to disaster. [Research Saturday]

John Hammond, Principal Security Researcher at Huntress, dives deep into the critical CVE-2025-30406 vulnerability affecting Gladinet CentreStack and Triofox. He shares alarming findings about how this vulnerability allows remote code execution via hardcoded keys, with hundreds of servers already compromised. John discusses the importance of endpoint security, the risks of deserialization, and proactive measures organizations can take to protect themselves. His insights underscore the urgent need for patching and security awareness among system administrators.
undefined
May 30, 2025 • 37min

All systems not go.

Matt Covington, VP of Product at Black Cloak, sheds light on cutting-edge impersonation techniques like deepfakes and the critical need for digital executive protection. He discusses alarming cybersecurity incidents, from recent DDoS attacks to the implications of regulatory changes in U.S. and Australia. Covington also emphasizes the new Browser-in-the-Middle attack targeting Safari users and provides insights on maintaining privacy and security amidst evolving threats.
undefined
8 snips
May 29, 2025 • 32min

When "out of the box" becomes "out of control."

Tim Starks, a senior reporter at CyberScoop specializing in cybersecurity, dives into pressing issues like the controversial collection of children's DNA for criminal databases. He highlights a troubling malware incident involving ASUS routers and new tactics from the APT41 group using Google Calendar for attacks. The discussion also covers the Salt Typhoon breach, revealing serious national security failures and the need for better public-private collaboration. Additionally, Starks addresses Victoria's Secret facing a significant cybersecurity crisis and its potential impact on consumer data.
undefined
May 28, 2025 • 35min

Fingers point east.

Tony Velleca, CEO of CyberProof, brings insights on exposure management and risk-focused strategies in cybersecurity. He dives into how organizations can prioritize threats against a backdrop of a rising tide of cyberespionage activities, including allegations against Chinese hackers. The discussion sheds light on the alarming growth of AI-driven malware and highlights the need for proactive security measures. Velleca emphasizes tailored risk assessments and the importance of collaboration among security teams to counter these evolving threats effectively.
undefined
May 27, 2025 • 36min

BEAR-ly washed and dangerous.

A notorious cyber threat actor, Laundry Bear, focuses on NATO cyber espionage as vulnerabilities in cybersecurity tools are laid bare. The rising tide of ransomware attacks, including one that hit Nova Scotia Power, highlights the urgent need for effective defenses. Discussions delve into securing AI adoption, spotlighting the risks of shadow AI amidst innovation. An intriguing anecdote reveals a CIA secret site's unexpected connection to Star Wars fandom, blending cybersecurity with pop culture in a surprising twist.
undefined
May 26, 2025 • 38min

Hugh Thompson on Building the RSA Conference [Afternoon Cyber Tea]

Hugh Thompson, Executive Chairman of RSA Conference and expert in cybersecurity, chats with Ann Johnson. They dive into the intricate planning of the world’s largest cybersecurity conference, touching on unique themes and even a surprise llama on the expo floor. Hugh reflects on his journey from applying mathematics to enhancing cybersecurity and emphasizes the industry's growing relevance. He shares personal stories about family and the humor in cybersecurity challenges, fostering an optimistic outlook for the future of the field.
undefined
May 26, 2025 • 23min

 AWS in Orbit: Automated Satellite Management. [T-Minus Space]

Dax Garner, CTO at Cognitive Space and aerospace engineer, joins Ed Meletyan, AWS Solutions Architect, to explore the future of satellite management. They discuss how automation and AI are revolutionizing satellite operations and optimizing Earth imaging tasks. The duo highlights the benefits of machine learning algorithms over traditional methods, enhancing operational efficiency. They also envision a future where cloud technology and collaboration with startups create a comprehensive space economy, making satellite management more efficient and scalable.
undefined
May 25, 2025 • 9min

Pattie Dillon: Take the leap. [Anti-fraud] [Career Notes]

Pattie Dillon, a Product Manager in Anti-Fraud Solutions at SpyCloud, recounts her inspiring journey from homemaker to cybersecurity professional. She shares her expertise in identity verification and how she tackled the challenges of money laundering. Pattie highlights the potential of underground data to combat online fraud and emphasizes the importance of privacy in tech solutions. Her belief that taking risks is essential echoes throughout, motivating listeners to embrace new opportunities in their careers.
undefined
May 25, 2025 • 27min

Purple teaming in the modern enterprise. [CyberWire-X]

Justin Tiplitsky, Director of Red Team at Adobe, and Ivan Koshkin, Senior Detection Engineer at Adobe, discuss the powerful concept of purple teaming in cybersecurity. They explore how red and blue teams collaborate to proactively identify and mitigate threats. Real-world scenarios illustrate the continuous learning that strengthens defenses. The duo emphasizes the importance of communication and agility, especially with evolving tech like artificial intelligence, along with key advice for aspiring cybersecurity professionals.
undefined
13 snips
May 24, 2025 • 20min

Pandas with a purpose. [Research Saturday]

Deepen Desai, Chief Security Officer and EVP of Cyber and AI Engineering at Zscaler, dives into the latest activities of the Mustang Panda group. He reveals the new arsenal, including advanced backdoors like TONEINS and tools for stealthy surveillance. Discussions include their phishing tactics and the development of custom keyloggers, PAKLOG and CorKLOG. Desai emphasizes the importance of a comprehensive defense strategy and the role of AI in both cyberattacks and cybersecurity measures, highlighting the ongoing battle against sophisticated threats.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app