

CyberWire Daily
N2K Networks
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
Episodes
Mentioned books

20 snips
Feb 15, 2025 • 35min
Bot or not? The fake CAPTCHA trick spreading Lumma malware. [Research Saturday}
Nati Tal, Head of Guardio Labs, dives into the dark world of online scams with his insights on the 'DeceptionAds' campaign. He reveals how fake CAPTCHAs trick users into running malicious commands, leading to Lumma malware infections. Nati discusses the deceptive tactics that cybercriminals use to exploit trust and bypass security measures. He highlights the challenges posed by ad networks that facilitate these attacks and the ongoing battle to protect users from such insidious threats, even after takedown efforts.

22 snips
Feb 14, 2025 • 34min
AI’s blind spots need human eyes.
Lawrence Pingree, VP of Technical Marketing at Dispersive, shares insights on the crucial need for preemptive defense in the AI arms race. He discusses the balance of technology and human intuition in national security, emphasizing ethics and neurodiversity. The conversation delves into ongoing cyber threats, including a vulnerability in SonicWall's firewall and the emergence of new phishing kits. Pingree advocates for proactive measures, underscoring how generative AI is reshaping the cybersecurity landscape.

5 snips
Feb 13, 2025 • 35min
Salt in the wound.
In this podcast, Jason Baker, Principal Security Consultant at GuidePoint Security and ransomware expert, discusses the alarming evolution of ransomware and cyber threats. He highlights the ongoing activities of Russian and Chinese cyber groups, such as Salt Typhoon and Seashell Blizzard, and their attacks on critical sectors. The conversation also delves into the implications of a massive IoT data breach and how AI advancements could intensify cyber risks. Baker emphasizes the importance of adapting our defenses to an ever-evolving cyber landscape.

11 snips
Feb 12, 2025 • 35min
DOGEgeddon: The cyber crisis hiding in plain sight.
Gianna Whitver, co-host of the Breaking Through in Cybersecurity Marketing podcast, shares her insights on pressing cyber threats. The discussion includes concerns over the potential cyberattack tied to DOGE and updates on a new national cyber director nomination. They delve into a North Korean laptop farm case and emphasize the urgent need for better cybersecurity strategies within government systems. Whitver also highlights innovative marketing tactics and the role of community building in cybersecurity.

Feb 11, 2025 • 35min
Apple’s race to secure your iPhone.
In this engaging conversation, John Fokker, Head of Threat Intelligence at Trellix, sheds light on the alarming convergence of nation-state actors and cybercriminals. He discusses Apple’s crucial security updates addressing a zero-day vulnerability that threatens iPhone users. The dialogue also dives into the rising brute-force attacks on edge devices and the complexities of incident response. Fokker emphasizes the urgent need for legislation to protect encryption, highlighting the intricate dance between security and rising cyber threats.

Feb 10, 2025 • 31min
Read all about it—or maybe not.
Mike Woodard, VP of Product Management for App Security at Digital.ai, shares insights on minimizing risks when deploying AI in cybersecurity. He discusses the importance of vendor vetting and legal compliance, as well as the evolving landscape of cyber threats. The conversation highlights cybersecurity challenges such as a significant cyberattack on newspapers and the need for quantum-safe technology. Woodard also provides practical tips for secure Wi-Fi passwords, showcasing the critical balance between leveraging AI's benefits and ensuring data protection.

Feb 9, 2025 • 8min
Avi Shua: Try to do things by yourself. [CEO] [Career Notes]
Avi Shua, CEO and co-founder of Orca Security, inspires listeners with his journey from a curious teen hacktivist to a cybersecurity leader. He shares insights from his unique training with the Israeli Army's Intelligence Unit 8200, emphasizing the value of independent problem-solving. Avi advocates for simplifying cybersecurity practices so that professionals can focus on their core responsibilities, while also encouraging newcomers to find their passion in the field. His vision aims to elevate security work beyond mere troubleshooting.

20 snips
Feb 8, 2025 • 22min
Cleo’s trojan horse. [Research Saturday]
Mark Manglicmot, SVP of Security Services at Arctic Wolf, is a cybersecurity expert who dives into the Cleopatra mass exploitation campaign. He discusses the alarming use of a Java backdoor, which attackers deploy via PowerShell stagers, exploiting vulnerabilities in Cleo's MFT software. Mark highlights the ongoing challenges in cybersecurity, emphasizing the need for proactive measures and vigilance against evolving threats. He also stresses the importance of software updates and robust vulnerability management to fend off sophisticated tactics like those used in the Cleopatra campaign.

17 snips
Feb 7, 2025 • 37min
DOGE-eat-DOGE world.
John Anthony Smith, Founder and Chief Security Officer at Fenix24, dives into the world of cyber resilience and the importance of data backups. He discusses the rise of AI-related security concerns, including vulnerabilities in popular platforms like DeepSeek and Microsoft Outlook. The conversation highlights the risks of phishing campaigns and emerging threats from malicious machine learning models. Smith emphasizes the need for preparedness and proper testing to combat modern cyber threats, making a compelling case for organizations to rethink their security strategies.

16 snips
Feb 6, 2025 • 44min
FCC around and find out.
Cliff Crosland, CEO and co-founder of Scanner.dev, shares insights on the evolving landscape of cybersecurity from a data management perspective. He delves into the concept of security data lakes, emphasizing their role in threat hunting and response. The discussion highlights the advantages of a 'bring your own' model, allowing organizations greater control over their data while utilizing vendor tools. With ransomware attacks declining, Crosland also touches on the importance of maintaining resilience and integrating innovative tools to navigate modern security challenges.