

CyberWire Daily
N2K Networks
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
Episodes
Mentioned books

20 snips
Oct 4, 2025 • 23min
China’s stealthiest spy operation yet. [Research Saturday]
Assaf Dahan, Director of Threat Research at Cortex XDR and a leading investigator with Unit 42, reveals the secrets behind Phantom Taurus, a newly identified Chinese espionage group. They discuss its shift from email to targeting databases, showcasing the sophisticated NET-STAR malware suite designed for stealthy infiltration of government and telecommunications sectors. Dahan highlights the group's persistence and custom tools, emphasizing its strategic move towards higher-value intelligence collection. He also shares critical defensive tips for organizations to enhance their IT hygiene.

39 snips
Oct 3, 2025 • 33min
WhatsApp worm spreads.
Brian Vecci, Field CTO at Varonis and data security expert, joins the discussion on rapid innovation amidst security risks. He highlights the challenges organizations face with unknown threats as they adopt AI technologies. Vecci exposes how innocent queries can lead to significant data leaks via collaboration tools. He also warns about data sprawl and emphasizes the need for robust controls in a landscape full of vulnerabilities. A fascinating exploration of how to innovate quickly without compromising sensitive data!

14 snips
Oct 2, 2025 • 24min
CISA furlough sparks fears.
Cynthia Kaiser, Senior Vice President of Halcyon's Ransomware Research Center and former FBI Deputy Assistant Director, shares her insights on the recent CISA furloughs. She discusses how the shutdown jeopardizes cybersecurity operations and information sharing among agencies. Kaiser highlights the risks companies face without liability protections and how reduced staffing affects multi-agency responses. She also offers practical advice for employees dealing with the emotional and financial impacts of furloughs.

Oct 1, 2025 • 26min
When politics break the firewall.
Tim Starks, a Senior Reporter at CyberScoop, delves into the alarming findings of a Senate Democrats' report on the Department of Government Efficiency (DOGE). He highlights that DOGE has operated outside privacy and cybersecurity regulations, sparking concerns about agency practices. The discussion also touches on bipartisan oversight efforts and how agencies have reacted to these findings. Starks warns citizens to stay vigilant about cybersecurity issues, emphasizing the importance of public engagement in governance.

Sep 30, 2025 • 24min
One flaw to rule the root.
CISA sounds the alarm over a critical sudo vulnerability that could lead to privilege escalation. South Korea escalates its cyber threat level after a data center fire raises concerns. Microsoft disrupts an AI-enhanced phishing campaign using malicious SVGs, while landlords face accusations of scraping sensitive payroll data. Cybercriminals prepare for potential FIFA fraud leading up to 2026. Plus, insights into the evolution of hacker culture and the burnout impacting cybersecurity professionals.

12 snips
Sep 29, 2025 • 30min
The November that never ended.
A Chinese state-sponsored group exploits enterprise devices for global espionage. The UK backs Jaguar Land Rover with a £1.5 billion loan following cyberattacks. A critical flaw in Fortra's file transfer product is under active exploitation. Akira ransomware bypasses MFA, raising security concerns. Dutch teens are arrested for spying near Europol, highlighting youth recruitment in espionage. Harrods suffers a significant data breach affecting thousands, while Interpol targets cybercrime in Africa. A deep dive into Japan's cybersecurity ecosystem reveals intriguing insights.

Sep 28, 2025 • 11min
Joe Carrigan: Build your network. [Security engineer] [Career Notes]
Joe Carrigan, a senior security engineer at the Johns Hopkins University Information Security Institute, shares his winding career journey from a theater enthusiast to a tech expert. He reveals how a chance conversation led him to pursue IT, the importance of cybersecurity education, and his concerns about the public’s cyber hygiene. Joe emphasizes the power of networking, noting that most of his job opportunities stem from his connections. His insights blend personal anecdotes with practical advice for anyone looking to navigate a career in technology.

14 snips
Sep 27, 2025 • 24min
Sunny-side spyware. [Research Saturday]
Join Martin Zujek, Technical Solutions Director at Bitdefender, as he dives into the cunning world of the Curly Comrades APT. He reveals how this newly identified Chinese group employs EggStreme, a sophisticated malware framework targeting a Philippine military company. Martin details the group's stealthy tactics like DLL sideloading and in-memory execution, making detection a challenge. He shares insights on their geopolitical motivations, persistence methods, and defensive measures organizations can take to combat such advanced threats.

29 snips
Sep 26, 2025 • 24min
CISA sounds the alarm on Cisco flaws.
Dan Trujillo, a leader at the Air Force Research Laboratory's Space Vehicles Directorate, dives into the crucial realm of securing satellites from cyber threats. He discusses the growing demand for expertise in space cybersecurity and offers invaluable career advice for those looking to enter this exciting field. Trujillo highlights the rapidly evolving space industry and the importance of resilience against cyber attacks, making a case for why aspiring professionals should consider this path.

22 snips
Sep 25, 2025 • 29min
Critical GoAnywhere bug exposed.
Michele Kellerman, a cybersecurity engineer at Johns Hopkins University, dives into the privacy storm surrounding women’s health and period-tracking apps. She highlights how HIPAA protections often don’t cover these apps, leaving users vulnerable. Following the Dobbs decision, privacy concerns have intensified, as data from these apps could potentially be misused in legal contexts. Kellerman also explores ongoing legislative efforts to protect reproductive health data amidst a patchwork of state laws.


