

CyberWire Daily
N2K Networks
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
Episodes
Mentioned books

28 snips
Jun 4, 2025 • 37min
Appetite for tracking: A feast on private data.
Rohan Pinto, CTO of 1Kosmos, sheds light on the repercussions of AI deepfakes for biometric security. He discusses the urgent need to bolster biometric systems against sophisticated digital threats. The conversation reveals limitations in traditional methods like Face ID and introduces innovative solutions such as Live ID to enhance real-time authentication. Pinto emphasizes balancing security and user accessibility while leveraging advanced analytics for effective risk management in organizations. This episode is a must-listen for anyone concerned about the future of digital identity security.

Jun 3, 2025 • 43min
Zero-day déjà vu.
Jon Miller, CEO and Co-founder of Halcyon, specializes in anti-ransomware solutions. He dives into the emerging threat of Bring Your Own Vulnerable Driver (BYOVD) attacks, explaining their security implications. The discussion highlights recent cybersecurity incidents such as a critical Chrome zero-day vulnerability and a pivotal Splunk flaw. Miller emphasizes the need for targeted defenses against evolving ransomware tactics and explores challenges in identifying hackers amid increasing cyber risks and compliance complexities.

Jun 2, 2025 • 29min
AVCheck goes dark in Operation Endgame.
An international law enforcement operation successfully dismantles the AVCheck criminal organization, spotlighting a significant win against cybercrime. Meanwhile, major budget cuts loom over U.S. cybersecurity agencies, impacting crucial defenses. The rise of stealthy malware like Lactrodectus poses new threats, as vulnerabilities in high-profile software created alarm. AI's complexities in attention mechanisms reveal biases, blending physics with technology. The importance of human connection in cybersecurity is highlighted, showcasing the spirit of collaboration at conferences.

Jun 1, 2025 • 11min
Brandon Karpf: A sailor of the 21st century. [Transitioning service member] [Career Notes]
Brandon Karpf, a Lieutenant in the US Navy and Skillbridge Fellow at the CyberWire, shares his fascinating journey from the Naval Academy to a career in cyber operations. He discusses the stark contrasts between military life and his educational experience at MIT, shaped by mentorship and national security missions. As he navigates the transition to civilian life, Brandon opens up about personal identity struggles and the importance of adaptability. He emphasizes the value of community in cybersecurity and cherishing moments with loved ones while pursuing meaningful work.

8 snips
May 31, 2025 • 22min
Triofox and the key to disaster. [Research Saturday]
John Hammond, Principal Security Researcher at Huntress, dives deep into the critical CVE-2025-30406 vulnerability affecting Gladinet CentreStack and Triofox. He shares alarming findings about how this vulnerability allows remote code execution via hardcoded keys, with hundreds of servers already compromised. John discusses the importance of endpoint security, the risks of deserialization, and proactive measures organizations can take to protect themselves. His insights underscore the urgent need for patching and security awareness among system administrators.

May 30, 2025 • 37min
All systems not go.
Matt Covington, VP of Product at Black Cloak, sheds light on cutting-edge impersonation techniques like deepfakes and the critical need for digital executive protection. He discusses alarming cybersecurity incidents, from recent DDoS attacks to the implications of regulatory changes in U.S. and Australia. Covington also emphasizes the new Browser-in-the-Middle attack targeting Safari users and provides insights on maintaining privacy and security amidst evolving threats.

8 snips
May 29, 2025 • 32min
When "out of the box" becomes "out of control."
Tim Starks, a senior reporter at CyberScoop specializing in cybersecurity, dives into pressing issues like the controversial collection of children's DNA for criminal databases. He highlights a troubling malware incident involving ASUS routers and new tactics from the APT41 group using Google Calendar for attacks. The discussion also covers the Salt Typhoon breach, revealing serious national security failures and the need for better public-private collaboration. Additionally, Starks addresses Victoria's Secret facing a significant cybersecurity crisis and its potential impact on consumer data.

May 28, 2025 • 35min
Fingers point east.
Tony Velleca, CEO of CyberProof, brings insights on exposure management and risk-focused strategies in cybersecurity. He dives into how organizations can prioritize threats against a backdrop of a rising tide of cyberespionage activities, including allegations against Chinese hackers. The discussion sheds light on the alarming growth of AI-driven malware and highlights the need for proactive security measures. Velleca emphasizes tailored risk assessments and the importance of collaboration among security teams to counter these evolving threats effectively.

4 snips
May 27, 2025 • 36min
BEAR-ly washed and dangerous.
A notorious cyber threat actor, Laundry Bear, focuses on NATO cyber espionage as vulnerabilities in cybersecurity tools are laid bare. The rising tide of ransomware attacks, including one that hit Nova Scotia Power, highlights the urgent need for effective defenses. Discussions delve into securing AI adoption, spotlighting the risks of shadow AI amidst innovation. An intriguing anecdote reveals a CIA secret site's unexpected connection to Star Wars fandom, blending cybersecurity with pop culture in a surprising twist.

May 26, 2025 • 38min
Hugh Thompson on Building the RSA Conference [Afternoon Cyber Tea]
Hugh Thompson, Executive Chairman of RSA Conference and expert in cybersecurity, chats with Ann Johnson. They dive into the intricate planning of the world’s largest cybersecurity conference, touching on unique themes and even a surprise llama on the expo floor. Hugh reflects on his journey from applying mathematics to enhancing cybersecurity and emphasizes the industry's growing relevance. He shares personal stories about family and the humor in cybersecurity challenges, fostering an optimistic outlook for the future of the field.