

CyberWire Daily
N2K Networks
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
Episodes
Mentioned books

23 snips
Jun 14, 2025 • 22min
Hiding in plain sight with vibe coding.
Ziv Karliner, Co-Founder and CTO of Pillar Security, dives into the world of AI-driven coding tools like GitHub Copilot and Cursor. He reveals alarming new vulnerabilities that hackers can exploit through Vibe Coding. Specifically, he discusses the 'Rules File Backdoor,' a technique that allows attackers to embed malicious code within seemingly legitimate instructions. This highlights the urgent need for developers to adopt new security strategies as they navigate the dual-edged sword of rapid AI adoption in software development.

9 snips
Jun 13, 2025 • 29min
Cloudflare’s cloudy day resolved.
Cloudflare clarifies that a recent outage wasn't a cyberattack, easing concerns. Microsoft is tackling authentication issues in Microsoft 365 while facing a disturbing account takeover campaign. Predator mobile spyware continues to evade detection, posing a significant risk. Meanwhile, cybercriminals from Fin6 exploit LinkedIn for recruiting scams. The conversation also highlights urgent security patches and innovative tactics that bypass traditional defenses. Lastly, AI integration in government initiatives sparks a discussion on its potential in enhancing cybersecurity.

15 snips
Jun 12, 2025 • 34min
Scam operations disrupted across Asia.
Interpol's recent Operation Secure dismantles a major cybercrime network, showcasing a significant victory against scammers. Singapore steps up by closing down scam centers linked to massive financial fraud. Innovative data theft methods are discussed, including the use of smartwatches for exfiltration. The ongoing threat of spyware against journalists raises alarms, while trouble looms for Erie Insurance following a cyberattack. Additionally, the evolving landscape of antitrust policies and the complexities of AI vulnerabilities are examined.

Jun 11, 2025 • 37min
Ghost students “haunting” online colleges.
Matt Radolec, VP of Incident Response at Varonis, dives into the alarming trend of 'ghost students' exploiting online courses for government funds. He explores the financial impact on educational institutions and the challenges posed to academic integrity. The discussion reveals the dual nature of AI, seen as both a productivity booster and a potential threat in cybersecurity. Radolec emphasizes the need for organizations to manage data securely while integrating AI, learning from past tech implementations to prevent vulnerabilities in this new landscape.

4 snips
Jun 10, 2025 • 34min
Jedai tricks, human risks.
In this discussion, Arjun Bhatnagar, CEO of Cloaked and a digital privacy expert, sheds light on the urgent need for enhanced cybersecurity practices. He reveals alarming vulnerabilities like the unsecured Chroma database affecting Canva creators and highlights new cyber-espionage threats linked to China. Arjun offers practical advice on protecting digital privacy and emphasizes the importance of effective password management. From stealthy malware targeting Russian entities to rising ransomware threats, he stresses the risks that come with everyday apps.

Jun 9, 2025 • 36min
White House reboots cybersecurity priorities.
In this discussion, Tim Starks, Senior Reporter at CyberScoop, dives into pressing cybersecurity issues, including a significant overhaul of U.S. cybersecurity policy driven by a new executive order. He highlights the focus on policy coordination with Sean Cairncross as a potential National Cyber Director. The conversation also touches on the scrutiny around cyber threats from Chinese hackers and the legal consequences of recent cybercrime cases. With a backdrop of challenges in technology and legislative dynamics, Starks provides insightful analysis on the current landscape.

16 snips
Jun 8, 2025 • 10min
Ell Marquez: It's okay to be new. [Linux] [Career Notes]
Ell Marquez, a Linux and Security Advocate at Intezer, shares her remarkable journey from a challenging upbringing on a family ranch to a thriving career in tech. She emphasizes the significance of lifelong learning in an ever-evolving industry. Ell highlights her 'it's okay to be new' campaign, advocating for newcomers in tech and the value of mentorship. With insights on embracing change and being unapologetically oneself, her story inspires anyone navigating their path in technology.

5 snips
Jun 7, 2025 • 25min
A new stealer hiding behind AI hype. [Research Saturday]
Join Michael Gorelik, Chief Technology Officer at Morphisec, as he unveils the Noodlophile Stealer, a new type of malware hiding behind the allure of fake AI video generation platforms. This sneaky threat lures users into uploading content, only to steal their browser credentials and cryptocurrency. Gorelik discusses the deceptive delivery methods, including viral campaigns that mimic legitimate software. He highlights the evolving challenges in cybersecurity and the importance of vigilance in spotting these malicious tactics.

12 snips
Jun 6, 2025 • 33min
Beware of BADBOX.
In this discussion, Ian Bramson, the Global Head of Industrial Cybersecurity at Black & Veatch, tackles the pressing issue of cyberattack readiness in industrial settings. He highlights the dangers of BADBOX 2.0 malware targeting IoT devices and exposes the vulnerabilities found in Chrome extensions. Ian emphasizes the need for organizations to transition from compliance-driven practices to a more proactive cybersecurity approach. With threats evolving, he underscores the urgency of foundational security measures and board commitment to safeguard critical infrastructure.

23 snips
Jun 5, 2025 • 34min
China’s largest data leak exposes billions.
Anika Gupta, the Chief Product Officer at Rubrik, dives into the massive data leak from China, potentially exposing over 4 billion records. She discusses the pitfalls organizations face when transitioning to the cloud, where security is often mistakenly assumed to be managed. Gupta highlights the rising threats from ransomware gangs and the critical vulnerability of U.S. infrastructure to cyberattacks. The conversation also touches on the role of leadership in enhancing security measures amidst rapid technological changes.