CyberWire Daily cover image

CyberWire Daily

Latest episodes

undefined
9 snips
Apr 5, 2025 • 36min

Bybit’s $1.4B breach. [Research Saturday]

Zach Edwards, a researcher at Silent Push who specializes in North Korean cyberattacks and cryptocurrency heists, uncovers the dark intricacies of the $1.4 billion Bybit hack. He reveals how Lazarus Group's tactics, like fake job scams and VPN usage, pose significant risks to crypto users. The discussion highlights alarming connections to state-sponsored cybercrime and offers insights on improving cybersecurity through community collaboration. Edwards' research illustrates the urgent need for vigilance against the ever-evolving threat landscape in cryptocurrency.
undefined
Apr 4, 2025 • 36min

A leadership shift.

Dave DeWalt, Founder and CEO of NightDragon, shares his expertise on the current landscape of cybersecurity. He discusses the impact of recent leadership changes in national security and critical vulnerabilities threatening data integrity. The conversation highlights emerging cyber threats, like ransomware and sophisticated malware tactics, particularly during tax season. DeWalt also emphasizes the dual role of AI in both strengthening defenses and creating new risks, outlining how companies can better navigate these evolving challenges.
undefined
Apr 3, 2025 • 31min

The invisible force fueling cyber chaos.

Johannes Ullrich, Dean of Research at SANS Technology Institute, shares insights on the evolving landscape of cybersecurity. He dives into the Fast Flux technique, now recognized as a national security threat, and discusses a critical authentication flaw in Crush FTP. Ullrich highlights vulnerabilities in Next.js applications, such as authentication loops and security flaws stemming from design choices. The conversation also touches on the rebranding of ransomware groups and the importance of robust application security measures in combating cyber threats.
undefined
Apr 2, 2025 • 30min

Chrome & Firefox squash the latest flaws.

Google and Mozilla take a firm stance against security vulnerabilities, patching numerous flaws in their browsers. The Royal Mail Group suffers a massive data breach, raising alarm bells across industries. A peculiar campaign is looking to recruit hackers to target Chinese websites. Meanwhile, PostgreSQL servers are under siege from cryptojacking attempts. The evolving landscape of cyber threats is further illuminated by General Paul Nakasone’s insights. Lastly, discussions around AI's role in society spark fascinating questions about its impact on human interaction.
undefined
Apr 1, 2025 • 31min

Hackers beware, fines are in the air.

The UK reveals a new Cyber Security and Resilience Bill to bolster critical infrastructure protections. Apple alerts users to critical vulnerabilities under active exploitation. InterLock ransomware claims a significant cyberattack. Microsoft highlights serious flaws in Canon printer drivers. A Canadian hacker faces charges for a breach involving the Texas Republican Party. Insights into the urgent need for post-quantum cybersecurity measures take center stage, while the challenges of AI misinformation raise eyebrows.
undefined
Mar 31, 2025 • 36min

Ransom demands and medical data for sale.

Jake Braun, former White House Principal Deputy National Cyber Director and current Executive Director of the Cyber Policy Initiative at the University of Chicago, joins to discuss pressing cyber threats. They delve into the recent Oracle Health data breach, highlighting vulnerabilities in healthcare. The conversation shifts to the unique cybersecurity challenges in space, advocating for its designation as critical infrastructure. They also touch on the innovative tactics used by cybercriminals like the Lazarus Group and offer insights into strengthening defenses for startups.
undefined
7 snips
Mar 30, 2025 • 9min

Alyssa Miller: We have to elevate others. [BISO] [Career Notes]

Alyssa Miller, Business Information Security Officer at S&P Global Ratings, champions inclusivity in cybersecurity. She shares her unique journey from programmer to security leader, reflecting on cultural shocks and challenges along the way. Alyssa emphasizes the importance of diverse perspectives in enhancing problem-solving within teams. She believes that by elevating others and fostering acceptance, the industry can achieve greater success. Her insights inspire a more welcoming and collaborative cybersecurity community.
undefined
7 snips
Mar 29, 2025 • 22min

Breaking barriers, one byte at a time. [Research Saturday]

Jon Williams, a vulnerability researcher at Bishop Fox, sheds light on his captivating work in decrypting SonicWall's SonicOSX firmware. He discusses the intricate challenges of reverse-engineering encrypted systems and the creation of Sonicrack, a new tool for extracting keys from VMware images. The conversation also touches on the ethics of disclosing security tools publicly, emphasizing the balance between transparency and potential misuse. Williams highlights the importance of independent research in enhancing cybersecurity and shares vital recommendations for managing firmware security.
undefined
Mar 28, 2025 • 35min

New sandbox escape looks awfully familiar.

Chris Wysopal, the Founder and Chief Security Evangelist of Veracode, delves into the alarming increase in the average fix time for security flaws, shedding light on how modern technology complicates the issue. He reveals that many organizations are sitting on critical security debt for over a year. The conversation also touches on significant vulnerabilities affecting both Firefox and Chrome. Additionally, the RedCurl gang's first foray into ransomware adds a chilling twist to current cyber threats, while innovative automation in cybersecurity is showcased.
undefined
Mar 27, 2025 • 36min

FamousSparrow’s sneaky resurgence.

Tal Skverer, Research Team Lead from Astrix, sheds light on the resurgence of China's FamousSparrow hacking group and its impact on cybersecurity. The conversation dives into the dangers of exposed data from misconfigured Amazon S3 buckets and a sophisticated Linux backdoor aimed at industrial systems. Tal discusses the significance of the OWASP NHI Top 10 framework for securing non-human identities, offering crucial insights on best practices and the risks of improper off-boarding. The episode also touches on automated credential stuffing and the evolving cyber threat landscape.

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner