

CyberWire Daily
N2K Networks
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
Episodes
Mentioned books

22 snips
Aug 21, 2025 • 25min
Behind the lock lies a flaw.
Ron Zayas, CEO of Ironwall by Incogni, dives into the hidden data sharing and privacy risks associated with Buy Now Pay Later apps. He discusses how these services, while enticing for consumers, can lead to significant privacy concerns due to extensive data collection practices. Zayas highlights the impulsive buying behavior particularly among younger users and the implications of such trends. He also touches on the need for transparency and ethical practices in the evolving landscape of financial technology.

10 snips
Aug 20, 2025 • 32min
Undoing the undo bug.
Matt Radolec, VP of Incident Response, Cloud Operations, and Sales Engineering at Varonis, discusses critical issues in cloud security and data risk assessments. He dives into the challenges of securing Salesforce, particularly the risks of outsourcing and permissions management. Radolec highlights threats from groups like ShinyHunters and stresses the need for user awareness and strong security practices. The conversation also touches on Microsoft's Copilot and its compliance implications, emphasizing a proactive approach to cybersecurity.

10 snips
Aug 19, 2025 • 26min
Inside Intel’s internal web maze.
A researcher reveals shocking vulnerabilities within Intel's internal sites, endangering sensitive data. The Kimsuky group targets South Korean diplomatic missions, while a new DDoS flaw emerges despite past fixes. A ransomware attack on a drug company raises alarm bells. The podcast dives into the complexities of context switching for analysts in Security Operations Centers, highlighting the toll on productivity and potential automation solutions. With leaked malware code and rising digital fraud, the episode underscores the urgent need for stronger security measures.

Aug 18, 2025 • 27min
Workday’s bad day.
Tim Starks, a senior reporter at CyberScoop, dives into the fallout from Workday's recent data breach, revealing how social engineering plays into cyber threats. He discusses alarming vulnerabilities like a zero-day in Elastic’s EDR software and the rise of ghost-tapping fraud techniques. Starks also addresses the legal challenges Zelle faces over fraud claims and highlights the implications of recent executive orders on cybersecurity, showcasing mixed reactions within the cyber community. Additionally, he touches on the issue of bots creating echo chambers in online spaces.

21 snips
Aug 16, 2025 • 30min
The CVE countdown clock. [Research Saturday]
Bob Rudis, VP of Data Science at GreyNoise, shares fascinating insights into how early warning signals can indicate impending vulnerabilities in cybersecurity. He reveals that spikes in malicious activity against technologies like VPNs often occur weeks before new CVEs are disclosed. The discussion highlights a critical six-week window for defenders to react. Rudis provides actionable strategies for recognizing these patterns and emphasizes the importance of intuition in threat analysis, showcasing how gut feelings can play a pivotal role even in a data-driven world.

6 snips
Aug 16, 2025 • 10min
Dr. Rois Ni Thuama: Get into the game. [Cyber governance] [Career Notes]
Rois Ni Thuama, Head of Cyber Governance at Red Sift, shares her fascinating career journey, which includes working on music videos and documentaries in South Africa before diving into tech startups. She emphasizes the importance of coding, risk management, and privacy legislation for aspiring professionals. Rois illustrates the evolving landscape of cybersecurity governance and highlights the growing opportunities for those with a legal background to enter the field. Her advice? Just get into the game!

39 snips
Aug 15, 2025 • 30min
Media server mayday.
Randall Degges, Head of Developer and Security Relations at Snyk, sheds light on the perils of underqualified coding support and its potential to invite nation-state threats. He discusses the urgent security vulnerabilities that prompted Plex to advise immediate updates. Delving into critical breaches, he highlights the illicit market for compromised government email accounts. Degges also emphasizes the role of proactive security in software development, warning against prioritizing speed over safety and exploring the twin challenges posed by generative AI.

32 snips
Aug 14, 2025 • 27min
Dialysis down, data out.
Michele Campobasso, a Senior Researcher at Forescout, dives deep into the intriguing world of vibe hacking. Their recent research uncovers the disappointingly high failure rates of AI models in vulnerability research and exploit development. Campobasso highlights how novice attackers struggle with generative AI tools, revealing the limitations faced even with the best commercial systems. The conversation also touches on recent high-profile data breaches and cyber threats, including a concerning case linked to North Korean operatives.

28 snips
Aug 13, 2025 • 29min
When spies get spied on.
Jack Jones, the mastermind behind the Factor Analysis of Information Risk (FAIR), shares his expertise on cyber risk quantification. He discusses the future of cyber risk measurement and sheds light on the adaptability of the FAIR model in the face of evolving threats like AI and ransomware. The conversation also touches on recent cybersecurity incidents, including a ransomware attack on Royal Enfield and the persistent dangers posed by Russian-aligned APT groups. Prepare to dive into the complex world of risk assessment and data privacy!

5 snips
Aug 12, 2025 • 28min
Kimsuky gets kim-sunk.
Sean Deuby, Principal Technologist at Semperis, shares his expertise on ransomware and identity security challenges. He discusses the recent data leak from North Korean hackers, revealing alarming insights into their operations. The conversation also covers a ransomware attack on a Dutch lab that compromised medical data for hundreds of thousands. Deuby emphasizes how the rise of AI is reshaping cyber threats, while cybercriminals increasingly target identity systems. The importance of fundamental security practices in our evolving threat landscape is a key takeaway.