
CyberWire Daily
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
Latest episodes

9 snips
Apr 5, 2025 • 36min
Bybit’s $1.4B breach. [Research Saturday]
Zach Edwards, a researcher at Silent Push who specializes in North Korean cyberattacks and cryptocurrency heists, uncovers the dark intricacies of the $1.4 billion Bybit hack. He reveals how Lazarus Group's tactics, like fake job scams and VPN usage, pose significant risks to crypto users. The discussion highlights alarming connections to state-sponsored cybercrime and offers insights on improving cybersecurity through community collaboration. Edwards' research illustrates the urgent need for vigilance against the ever-evolving threat landscape in cryptocurrency.

Apr 4, 2025 • 36min
A leadership shift.
Dave DeWalt, Founder and CEO of NightDragon, shares his expertise on the current landscape of cybersecurity. He discusses the impact of recent leadership changes in national security and critical vulnerabilities threatening data integrity. The conversation highlights emerging cyber threats, like ransomware and sophisticated malware tactics, particularly during tax season. DeWalt also emphasizes the dual role of AI in both strengthening defenses and creating new risks, outlining how companies can better navigate these evolving challenges.

Apr 3, 2025 • 31min
The invisible force fueling cyber chaos.
Johannes Ullrich, Dean of Research at SANS Technology Institute, shares insights on the evolving landscape of cybersecurity. He dives into the Fast Flux technique, now recognized as a national security threat, and discusses a critical authentication flaw in Crush FTP. Ullrich highlights vulnerabilities in Next.js applications, such as authentication loops and security flaws stemming from design choices. The conversation also touches on the rebranding of ransomware groups and the importance of robust application security measures in combating cyber threats.

Apr 2, 2025 • 30min
Chrome & Firefox squash the latest flaws.
Google and Mozilla take a firm stance against security vulnerabilities, patching numerous flaws in their browsers. The Royal Mail Group suffers a massive data breach, raising alarm bells across industries. A peculiar campaign is looking to recruit hackers to target Chinese websites. Meanwhile, PostgreSQL servers are under siege from cryptojacking attempts. The evolving landscape of cyber threats is further illuminated by General Paul Nakasone’s insights. Lastly, discussions around AI's role in society spark fascinating questions about its impact on human interaction.

Apr 1, 2025 • 31min
Hackers beware, fines are in the air.
The UK reveals a new Cyber Security and Resilience Bill to bolster critical infrastructure protections. Apple alerts users to critical vulnerabilities under active exploitation. InterLock ransomware claims a significant cyberattack. Microsoft highlights serious flaws in Canon printer drivers. A Canadian hacker faces charges for a breach involving the Texas Republican Party. Insights into the urgent need for post-quantum cybersecurity measures take center stage, while the challenges of AI misinformation raise eyebrows.

Mar 31, 2025 • 36min
Ransom demands and medical data for sale.
Jake Braun, former White House Principal Deputy National Cyber Director and current Executive Director of the Cyber Policy Initiative at the University of Chicago, joins to discuss pressing cyber threats. They delve into the recent Oracle Health data breach, highlighting vulnerabilities in healthcare. The conversation shifts to the unique cybersecurity challenges in space, advocating for its designation as critical infrastructure. They also touch on the innovative tactics used by cybercriminals like the Lazarus Group and offer insights into strengthening defenses for startups.

7 snips
Mar 30, 2025 • 9min
Alyssa Miller: We have to elevate others. [BISO] [Career Notes]
Alyssa Miller, Business Information Security Officer at S&P Global Ratings, champions inclusivity in cybersecurity. She shares her unique journey from programmer to security leader, reflecting on cultural shocks and challenges along the way. Alyssa emphasizes the importance of diverse perspectives in enhancing problem-solving within teams. She believes that by elevating others and fostering acceptance, the industry can achieve greater success. Her insights inspire a more welcoming and collaborative cybersecurity community.

7 snips
Mar 29, 2025 • 22min
Breaking barriers, one byte at a time. [Research Saturday]
Jon Williams, a vulnerability researcher at Bishop Fox, sheds light on his captivating work in decrypting SonicWall's SonicOSX firmware. He discusses the intricate challenges of reverse-engineering encrypted systems and the creation of Sonicrack, a new tool for extracting keys from VMware images. The conversation also touches on the ethics of disclosing security tools publicly, emphasizing the balance between transparency and potential misuse. Williams highlights the importance of independent research in enhancing cybersecurity and shares vital recommendations for managing firmware security.

Mar 28, 2025 • 35min
New sandbox escape looks awfully familiar.
Chris Wysopal, the Founder and Chief Security Evangelist of Veracode, delves into the alarming increase in the average fix time for security flaws, shedding light on how modern technology complicates the issue. He reveals that many organizations are sitting on critical security debt for over a year. The conversation also touches on significant vulnerabilities affecting both Firefox and Chrome. Additionally, the RedCurl gang's first foray into ransomware adds a chilling twist to current cyber threats, while innovative automation in cybersecurity is showcased.

Mar 27, 2025 • 36min
FamousSparrow’s sneaky resurgence.
Tal Skverer, Research Team Lead from Astrix, sheds light on the resurgence of China's FamousSparrow hacking group and its impact on cybersecurity. The conversation dives into the dangers of exposed data from misconfigured Amazon S3 buckets and a sophisticated Linux backdoor aimed at industrial systems. Tal discusses the significance of the OWASP NHI Top 10 framework for securing non-human identities, offering crucial insights on best practices and the risks of improper off-boarding. The episode also touches on automated credential stuffing and the evolving cyber threat landscape.
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.