CyberWire Daily

N2K Networks
undefined
4 snips
May 27, 2025 • 30min

BEAR-ly washed and dangerous.

A notorious cyber threat actor, Laundry Bear, focuses on NATO cyber espionage as vulnerabilities in cybersecurity tools are laid bare. The rising tide of ransomware attacks, including one that hit Nova Scotia Power, highlights the urgent need for effective defenses. Discussions delve into securing AI adoption, spotlighting the risks of shadow AI amidst innovation. An intriguing anecdote reveals a CIA secret site's unexpected connection to Star Wars fandom, blending cybersecurity with pop culture in a surprising twist.
undefined
May 26, 2025 • 23min

 AWS in Orbit: Automated Satellite Management. [T-Minus Space]

Dax Garner, CTO at Cognitive Space and aerospace engineer, joins Ed Meletyan, AWS Solutions Architect, to explore the future of satellite management. They discuss how automation and AI are revolutionizing satellite operations and optimizing Earth imaging tasks. The duo highlights the benefits of machine learning algorithms over traditional methods, enhancing operational efficiency. They also envision a future where cloud technology and collaboration with startups create a comprehensive space economy, making satellite management more efficient and scalable.
undefined
May 26, 2025 • 38min

Hugh Thompson on Building the RSA Conference [Afternoon Cyber Tea]

Hugh Thompson, Executive Chairman of RSA Conference and expert in cybersecurity, chats with Ann Johnson. They dive into the intricate planning of the world’s largest cybersecurity conference, touching on unique themes and even a surprise llama on the expo floor. Hugh reflects on his journey from applying mathematics to enhancing cybersecurity and emphasizes the industry's growing relevance. He shares personal stories about family and the humor in cybersecurity challenges, fostering an optimistic outlook for the future of the field.
undefined
May 25, 2025 • 9min

Pattie Dillon: Take the leap. [Anti-fraud] [Career Notes]

Pattie Dillon, a Product Manager in Anti-Fraud Solutions at SpyCloud, recounts her inspiring journey from homemaker to cybersecurity professional. She shares her expertise in identity verification and how she tackled the challenges of money laundering. Pattie highlights the potential of underground data to combat online fraud and emphasizes the importance of privacy in tech solutions. Her belief that taking risks is essential echoes throughout, motivating listeners to embrace new opportunities in their careers.
undefined
May 25, 2025 • 27min

Purple teaming in the modern enterprise. [CyberWire-X]

Justin Tiplitsky, Director of Red Team at Adobe, and Ivan Koshkin, Senior Detection Engineer at Adobe, discuss the powerful concept of purple teaming in cybersecurity. They explore how red and blue teams collaborate to proactively identify and mitigate threats. Real-world scenarios illustrate the continuous learning that strengthens defenses. The duo emphasizes the importance of communication and agility, especially with evolving tech like artificial intelligence, along with key advice for aspiring cybersecurity professionals.
undefined
13 snips
May 24, 2025 • 17min

Pandas with a purpose. [Research Saturday]

Deepen Desai, Chief Security Officer and EVP of Cyber and AI Engineering at Zscaler, dives into the latest activities of the Mustang Panda group. He reveals the new arsenal, including advanced backdoors like TONEINS and tools for stealthy surveillance. Discussions include their phishing tactics and the development of custom keyloggers, PAKLOG and CorKLOG. Desai emphasizes the importance of a comprehensive defense strategy and the role of AI in both cyberattacks and cybersecurity measures, highlighting the ongoing battle against sophisticated threats.
undefined
7 snips
May 23, 2025 • 34min

When malware masters meet their match.

In this conversation, Jeffrey Wheatman, Cyber Risk Expert at Black Kite, shares insights on critical cybersecurity challenges. He emphasizes the dangers of silent breaches and the threat posed by AI in revealing sensitive information. The discussion touches on Operation Endgame's impact on cybercriminal networks and the ethical dilemmas surrounding AI, especially regarding privacy. Wheatman also addresses the complexities of third-party risk management and the complications faced by hackers in navigating event participation amid current travel concerns.
undefined
May 22, 2025 • 26min

Lights out for Lumma.

David Holmes, CTO for Application Security at Imperva, shares his expertise on the surge of AI in bot attacks. The conversation dives into the dismantling of Lumma's malicious infrastructure and the alarming rise in automated attacks. Holmes highlights critical vulnerabilities, like those affecting Lexmark printers, and discusses the evolving tactics of cybercriminals. He emphasizes the pressing need for enhanced security measures and the role of AI in combating these sophisticated threats. Tune in for insights that every cybersecurity enthusiast won't want to miss!
undefined
May 21, 2025 • 35min

Bear in the network.

Rob Allen, Chief Product Officer at ThreatLocker, dives into the concept of zero trust and the deliberate simplicity of fundamental controls. He discusses how token theft and phishing can circumvent traditional security measures like MFA, allowing attackers easy access to critical systems. The conversation also highlights the increasing sophistication of cybercriminal tactics, particularly in targeting logistics and healthcare sectors. Allen underscores the need for organizations to adopt proactive endpoint protection and implement a 'deny by default' approach to enhance cybersecurity.
undefined
6 snips
May 20, 2025 • 29min

The Take It Down Act walks a fine line.

Chris Novak, Vice President of Global Cybersecurity Solutions at Verizon, discusses the newly signed Take It Down Act targeting non-consensual intimate images and its implications for free expression. He highlights the alarming rise in ransomware and exploitation of vulnerabilities, especially affecting small businesses. The conversation also touches on the urgent need for patching critical vulnerabilities and the broader challenges facing the cybersecurity workforce, stressing the importance of data-driven analysis in understanding global breaches.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app