CyberWire Daily cover image

CyberWire Daily

Latest episodes

undefined
Apr 24, 2025 • 47min

Are we a trade or a profession? [CISO Perspectives]

In this discussion, Larry Whiteside Jr., Chief Advisory Officer for The CISO Society and a veteran cybersecurity leader, dives into the debate over whether cybersecurity is a trade or a profession. He explores the importance of professional standards and training to bridge current gaps in the field. The conversation touches on the evolving role of CISOs, the necessity of better hiring practices, and the critical skills needed for future cybersecurity leaders. Larry advocates for fostering a skilled pipeline to elevate the industry and its professionals.
undefined
13 snips
Apr 23, 2025 • 35min

States struggle with cyber shift.

Cynthia Kaiser, Deputy Assistant Director at the FBI Cyber Division, sheds light on the critical state of cybersecurity as duties shift from federal oversight to the states. She addresses the alarming ransomware attacks, including one on Baltimore schools, and Russian threats to Dutch infrastructure. Kaiser emphasizes the necessity for urgent improvements in state preparedness amid evolving malware challenges and rising threats. The discussion highlights the importance of the IC3 in tackling the surge in cybercrime and how essential public reporting is for combating these issues.
undefined
Apr 22, 2025 • 43min

Proton66’s malware highway.

Bob Maley, CSO of Black Kite, shares his expertise on the escalating risks of third-party cyber incidents. The conversation dives into the nefarious activities of the Russian group Proton66 and emerging threats like a new Rust-based botnet targeting routers. Maley emphasizes the impact of CISA budget cuts and the rise of ransomware in healthcare. Additionally, the relaunch of the cybercrime marketplace Cracked raises alarms about compliance risks and the need for improved cybersecurity measures across industries.
undefined
14 snips
Apr 21, 2025 • 32min

When fake fixes hide real attacks.

Yoni Shohet, Co-founder and CEO of Valence Security, discusses critical cybersecurity threats posed by Chinese open source AI, particularly for financial institutions. He highlights the alarming use of ClickFix in state-sponsored cyber espionage, alongside Japan's urgent warnings about unauthorized trades. The conversation dives into the vulnerabilities of new Microsoft tools and the complexities of navigating AI risks in organizations. Shohet emphasizes the need for robust security measures as the landscape of cyber threats continues to evolve.
undefined
4 snips
Apr 20, 2025 • 8min

Rich Hale: Understanding the data. [CTO] [Career Notes]

Rich Hale shares his unique journey from aspiring board game designer to Chief Technology Officer. He discusses his diverse experiences in the Royal Air Force and their surprising applicability to cybersecurity. The conversation emphasizes the critical issue of securing dark data and why organizations must prioritize it. Hale also offers insightful leadership advice, advocating for empowering teams and embracing career transitions, reminding listeners to weigh their choices wisely before making significant leaps.
undefined
Apr 19, 2025 • 20min

Crafting malware with modern metals. [Research Saturday]

Join Nick Cerne, a Security Consultant from Bishop Fox with expertise in offensive security and malware development, as he dives into the fascinating realm of Rust in malware creation. He discusses how Rust's memory safety and anti-analysis features can enhance evasion tactics compared to traditional languages like C. Listeners will learn about the challenges of modern malware analysis and how evolving programming languages impact both malware development and cybersecurity defenses. Nick’s insights into realistic adversarial simulation are both enlightening and alarming!
undefined
Apr 18, 2025 • 33min

SSH-attered trust.

A critical vulnerability in Erlang/OTP SSH allows unauthenticated remote code execution. There’s a bipartisan effort to renew a key cybersecurity info sharing law. A newly discovered Linux kernel vulnerability allows local attackers to escalate privileges. A researcher uncovers 57 risky Chrome extensions with a combined 6 million users. AttackIQ shares StrelaStealer simulations. A major live events service provider notifies employees and customers of a data breach. CISA warns of an actively exploited SonicWall vulnerability. An airport retailer agrees to a multi-million dollar settlement stemming from a ransomware attack. A preview of RSAC 2025 with Linda Gray Martin and Britta Glade. Zoom-a-zoom zoom, it’s always DNS. Remember to leave us a 5-star rating and review in your favorite podcast app.Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.CyberWire GuestToday Dave sits down with Linda Gray Martin, Chief of Staff, and Britta Glade, SVP of Content and Communities, from RSAC sharing what is new at RSAC 2025.Selected ReadingCritical Erlang/OTP SSH pre-auth RCE is 'Surprisingly Easy' to exploit, patch now (Bleeping Computer)Bipartisan duo wants to renew 10-year-old cyberthreat information sharing law (The Record)Linux Kernel Vulnerability Let Attackers Escalate Privilege – PoC Released (Cyber Security News)Chrome extensions with 6 million installs have hidden tracking code (Bleeping Computer)Emulating the Stealthy StrelaStealer Malware (AttackIQ)Live Events Giant Legends International Hacked (SecurityWeek)CISA tags SonicWall VPN flaw as actively exploited in attacks (Bleeping Computer)Airport retailer agrees to $6.9 million settlement over ransomware data breach (The Record)Global Zoom Outage Caused by Server Block Imposed from GoDaddy Registry (Cyber Security News)Share your feedback.We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show?You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
undefined
Apr 17, 2025 • 36min

Microsoft squashes windows server bug.

Rob Allen, Chief Product Officer at ThreatLocker, dives into the layered approach to zero trust, emphasizing its importance in today's cybersecurity landscape. He explains how this strategy helps mitigate risks from threat actors exploiting legitimate applications. The discussion also highlights Microsoft’s emergency updates for Windows Server and the pressing need for organizations to proactively address vulnerabilities, particularly in the wake of high-profile breaches. Allen's insights provide vital direction for navigating complex security challenges.
undefined
11 snips
Apr 17, 2025 • 42min

Is the cyber talent ecosystem broken? [CISO Perspectives]

Ed Adams, Head of Cybersecurity for North America at Bureau Veritas Group and author of 'See Yourself in Cyber', explores the severe disconnect in the cyber talent ecosystem. He discusses the urgency of addressing outdated job qualifications and the need for practical skill development to meet evolving industry demands. Adams also shares insights on fostering diversity in cybersecurity, advocating for inclusive hiring practices. His unique perspective emphasizes the importance of soft skills and collaboration across teams to reshape the industry's future.
undefined
9 snips
Apr 16, 2025 • 34min

CVE program gets last-minute lifeline.

The CVE program faces a critical last-minute reprieve amid allegations of a security breach at the NLRB. Texas is gearing up to launch its own Cyber Command, highlighting increasing state-level cybersecurity efforts. ResolverRAT poses new threats in healthcare globally, while Microsoft warns about blue screen crashes linked to recent updates. Plus, insights into the Certified Ethical Hacker exam reveal vital tools like NMAP for effective test preparation. Meanwhile, 4chan's vulnerabilities raise red flags in online security compliance.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app