CyberWire Daily

N2K Networks
undefined
Jan 10, 2026 • 28min

Walking on EggStremes. [Research Saturday]

Martin Zugec, Technical Solutions Director at Bitdefender, dives into the intricate world of the EggStreme APT framework targeting a Philippine military company. He unveils the multi-stage, fileless techniques used for stealth and persistence, such as DLL sideloading and in-memory execution. The discussion highlights the sophisticated capabilities of this malware, including keylogging and data theft. Additionally, Martin shares crucial defensive recommendations, emphasizing a layered security approach to combat evolving cyber threats.
undefined
Jan 9, 2026 • 33min

Is interim the new permanent?

Sonali Shah, CEO of Cobalt and a leader in offensive security, discusses the future of AI in cybersecurity. She predicts that by 2026, AI will transition from a mere concept to a fundamental battleground. Shah highlights the importance of focusing on malicious intent rather than just data theft, warns about the risks of deepfakes in social engineering, and emphasizes the need for a mix of traditional and novel authentication methods. She also addresses AI's impact on talent pipelines and the necessity of retaining human oversight in complex security scenarios.
undefined
28 snips
Jan 8, 2026 • 25min

America goes solo on cyber.

Caitlin Clarke, Senior Director for Cybersecurity Services at a major law firm, shares her insights on CISA 2015 and its crucial role in modern cybersecurity practices. The discussion reveals the U.S. withdrawal from global cybersecurity institutions and highlights the alarming Ni8mare vulnerability exposing workflow platforms. Caitlin explains how CISA 2015 facilitates real-time information sharing among sectors, while also addressing privacy concerns. On a lighter note, facial recognition technology is explored in its unique application to bear ecology.
undefined
7 snips
Jan 7, 2026 • 31min

Cyberattack in the fast lane.

Deepen Desai, Chief Security Officer at Zscaler, delves into the future of enterprise AI and cybersecurity. He reveals the rising risks of AI-driven attacks, emphasizing their speed and adaptability. Desai also discusses the necessity of observability and zero-trust strategies to counter these threats. Furthermore, he highlights the concentration risk from few AI vendors and the prevalence of unsanctioned AI applications in organizations. With real-world usage stats, he explains which sectors are leading in AI adoption.
undefined
Jan 6, 2026 • 24min

X marks the violation.

Ilana Cohen, Chief Legal and Policy Officer at HackerOne and a former senior lawyer for President Obama, dives deep into the implications of the SolarWinds SEC dismissal for CISOs. She explains how it reduces personal risk for cybersecurity leaders but increases scrutiny on disclosures. Additionally, Cohen discusses the evolving landscape of cybersecurity regulations and the significance of aligning legal teams with organizational practices. The podcast also touches on various data breaches and the UK’s new Cyber Action Plan.
undefined
Jan 5, 2026 • 24min

A city goes dark as cyber questions multiply.

A city in Venezuela experiences a mysterious blackout, raising questions about whether it was caused by physical attacks or cyber threats. Trump halts a controversial chip technology deal while easing sanctions on Predator spyware. Greek officials investigate an air traffic communication failure, dispelling cyberattack claims. Meanwhile, the U.S. Army introduces a new officer role focused on AI and machine learning. Cybersecurity expert Troy Hunt discusses breach disclosure and the importance of transparency in addressing vulnerabilities.
undefined
Jan 4, 2026 • 10min

Michael Scott: A team of humble intellects. [Information security] [Career Notes]

Michael Scott, the Chief Information Security Officer at Immuta, shares his journey from the Navy to leading security for major restaurant brands like Arby's and Wendy's. He highlights the value of building teams of 'humble intellects,' emphasizing a culture focused on outcomes. Michael discusses the challenges of PCI compliance and cloud security, reflecting on how adversity shapes the security landscape. His advice for aspiring technologists centers on understanding business needs and fostering curiosity, aiming to enable and mentor within the industry.
undefined
10 snips
Jan 3, 2026 • 21min

Don’t trust that app!

Selena Larson, a staff threat researcher at Proofpoint, dives into the alarming world of MFA phishing. She outlines how threat actors impersonate legitimate services like Adobe using fake Microsoft OAuth apps, successfully stealing credentials through realistic phishing kits. Larson explains the mechanics of these attacks, including the methods used to bypass MFA and capture sensitive data. She concludes with recommendations for individuals and organizations to bolster security measures and stay vigilant against these evolving threats.
undefined
8 snips
Jan 2, 2026 • 27min

Cyber and its "Hive" Mind

Curtis Simpson, CISO at Armis, dives into the intriguing world of cyber threats as he discusses the 'Hive Mind' phenomenon, where attackers collaborate and share resources on the dark web. He highlights how traditional defenses are inadequate against this adaptive threat network. Curtis explains the role of AI in prioritizing vulnerabilities and improving defensive strategies, advocating for a proactive approach to security. He emphasizes the need to build resilient systems that can respond at the speed of these evolving threats.
undefined
4 snips
Jan 1, 2026 • 23min

Confronting China’s Expanding Cyber Threats [Threat Vector]

Wendi Whitmore, Chief Security Intelligence Officer at Palo Alto Networks, brings over 20 years of expertise in countering cyber threats. She discusses the alarming scale of China-linked cyber threats and the vulnerabilities in outdated operational technology. Wendi emphasizes the role of AI in threat detection and resilience, urging continuous intelligence sharing and scenario planning. She warns about the risks of AI in cyberattacks and advocates for automated detection systems. This insightful conversation highlights the urgent need for a proactive cybersecurity stance.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app