

CyberWire Daily
N2K Networks
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
Episodes
Mentioned books

12 snips
Jul 12, 2025 • 25min
Click here to steal. [Research Saturday]
Selena Larson, a Threat Researcher at Proofpoint and co-host of Only Malware in the Building, dives deep into the world of Amatera Stealer, a sophisticated rebranding of ACR Stealer. She reveals its advanced evasion techniques, including stealthy C2 communication and powerful PowerShell loaders. The discussion uncovers how Amatera employs creative social engineering and blockchain hosting to steal sensitive data, posing serious threats amid changing cybersecurity landscapes. Larson emphasizes the importance of heightened awareness and evolving defenses against such malware threats.

16 snips
Jul 11, 2025 • 26min
Behind the firewall, trouble brews.
Catherine Woneis, VP of Product at Fingerprint, sheds light on the escalating issue of music royalty fraud driven by bots. She reveals how fraudsters use AI-generated music and fake artists to manipulate streaming metrics, raking in millions. The discussion also touches on critical cybersecurity vulnerabilities, including flaws in popular software, and the broader implications of AI on security. Woneis emphasizes the necessity for companies to adopt robust bot detection solutions amid the ongoing digital fraud battle.

60 snips
Jul 10, 2025 • 30min
Cybercrime has a hefty price tag.
Ben Yelin, co-host of the Caveat podcast and a legal expert in technology policy, joins to discuss alarming trends in cybercrime and cybersecurity. UK police have arrested suspects connected to major retail cyberattacks, while international arrests highlight rising geopolitical tensions. Yelin and Ethan Cook dive into Congress' contentious attempt to regulate AI at the federal level, challenging state authority. They also tackle pressing issues like password insecurity, emphasizing the critical need for better governance in the digital age.

9 snips
Jul 9, 2025 • 24min
Plug-ins gone rogue.
Patch Tuesday reveals critical vulnerabilities, urging swift action from IT admins. An Iranian ransomware group targets U.S. and Israeli interests, while new spyware strains exploit Russian industries. Browser extensions are found to have infected millions, posing significant risks. Joe Carrigan sheds light on a savvy phishing scam aimed at CFOs, showcasing evolving tactics in cybercrime. Plus, the surprising question: can our feline friends outsmart algorithms? All this and more makes for a captivating discussion on today’s cybersecurity landscape.

12 snips
Jul 8, 2025 • 25min
Memory leaks and login sneaks.
Discover the latest in cybersecurity as researchers reveal proof-of-concept exploits for CitrixBleed2 and Grafana rolls out urgent patches for critical vulnerabilities. A hacker claims a breach at Spanish telecom giant Telefónica, while a new ransomware group called BERT is on the rise. In an eye-opening discussion, experts highlight security risks in low-code platforms and integrated development environments. Plus, a staggering data leak affects millions of job seekers, raising concerns about personal data security in the digital age.

6 snips
Jul 7, 2025 • 31min
SafePay, unsafe day.
Rob Allen, Chief Product Officer at ThreatLocker, discusses the pressing issue of security fatigue in cybersecurity. He argues that a 'Default Deny' strategy can mitigate this problem by enhancing security without overwhelming users. Recent high-profile cyber incidents, including a ransomware attack on Ingram Micro, highlight the evolving landscape of cybercrime and the need for smarter security measures. Allen also emphasizes the importance of user education in combating insider threats and improving compliance.

Jul 6, 2025 • 11min
Swati Shekhar: Challenges increase your risk appetite. [Engineering] [Career Notes]
Swati Shekhar, Head of Engineering at Ground Labs, shares her inspiring journey into the engineering world, marked by challenges and growth. She reveals how her early days as one of the few women in a male-dominated college sparked her resilience and risk appetite. Swati emphasizes the importance of stepping out of comfort zones and finding authenticity in career choices. She reflects on her transition from individual contributor to empathetic leader, highlighting teamwork and the power of effective communication in shaping a positive work culture.

17 snips
Jul 5, 2025 • 20min
Botnet’s back, tell a friend. [Research Saturday]
Silas Cutler, Principal Security Researcher at Censys, dives into the elusive Volt Typhoon threat group in this discussion. He reveals how recent FBI disruptions targeted the KV Botnet yet left its control infrastructure largely intact. The conversation uncovers the botnet's surprising resilience, with shifts in control servers hinting at adaptive strategies. Cutler emphasizes the challenges in attributing cyber threats and the importance of collaborative cybersecurity efforts to tackle nation-state actors and safeguard critical systems.

Jul 4, 2025 • 48min
Turning data into decisions. [Deep Space]
In this segment, Jackie Barbieri, Founder and CEO of Whitespace, empowers data analysts with tools for insightful decision-making. Dr. Steve Lewis, leader of The Aerospace Corporation’s SPEAR team, discusses unconventional uses of data in aerospace. They explore the evolution of data analysis in defense, the innovative application of AI in detecting illegal activities, and the importance of collaboration in the space community. Together, they highlight how AI enhances critical thinking, paving the way for more effective and creative problem-solving.

45 snips
Jul 4, 2025 • 38min
Secure Your Summer: Top Cyber Myths, Busted [Threat Vector]
Lisa Plaggemier, Executive Director of the National Cybersecurity Alliance, joins David Moulton to debunk common cybersecurity myths. She discusses the human aspects of security, emphasizing that emotions and storytelling can drive better habits. Lisa reveals alarming truths about password reuse and the risks of untrained AI usage in workplaces. The conversation highlights the importance of diversification in security measures and how engaging narratives can reshape public perceptions, making cybersecurity relatable and effective.


