CyberWire Daily

N2K Networks
undefined
28 snips
Jun 4, 2025 • 37min

Appetite for tracking: A feast on private data.

Rohan Pinto, CTO of 1Kosmos, sheds light on the repercussions of AI deepfakes for biometric security. He discusses the urgent need to bolster biometric systems against sophisticated digital threats. The conversation reveals limitations in traditional methods like Face ID and introduces innovative solutions such as Live ID to enhance real-time authentication. Pinto emphasizes balancing security and user accessibility while leveraging advanced analytics for effective risk management in organizations. This episode is a must-listen for anyone concerned about the future of digital identity security.
undefined
Jun 3, 2025 • 43min

Zero-day déjà vu.

Jon Miller, CEO and Co-founder of Halcyon, specializes in anti-ransomware solutions. He dives into the emerging threat of Bring Your Own Vulnerable Driver (BYOVD) attacks, explaining their security implications. The discussion highlights recent cybersecurity incidents such as a critical Chrome zero-day vulnerability and a pivotal Splunk flaw. Miller emphasizes the need for targeted defenses against evolving ransomware tactics and explores challenges in identifying hackers amid increasing cyber risks and compliance complexities.
undefined
Jun 2, 2025 • 29min

AVCheck goes dark in Operation Endgame.

An international law enforcement operation successfully dismantles the AVCheck criminal organization, spotlighting a significant win against cybercrime. Meanwhile, major budget cuts loom over U.S. cybersecurity agencies, impacting crucial defenses. The rise of stealthy malware like Lactrodectus poses new threats, as vulnerabilities in high-profile software created alarm. AI's complexities in attention mechanisms reveal biases, blending physics with technology. The importance of human connection in cybersecurity is highlighted, showcasing the spirit of collaboration at conferences.
undefined
Jun 1, 2025 • 11min

Brandon Karpf: A sailor of the 21st century. [Transitioning service member] [Career Notes]

Brandon Karpf, a Lieutenant in the US Navy and Skillbridge Fellow at the CyberWire, shares his fascinating journey from the Naval Academy to a career in cyber operations. He discusses the stark contrasts between military life and his educational experience at MIT, shaped by mentorship and national security missions. As he navigates the transition to civilian life, Brandon opens up about personal identity struggles and the importance of adaptability. He emphasizes the value of community in cybersecurity and cherishing moments with loved ones while pursuing meaningful work.
undefined
8 snips
May 31, 2025 • 22min

Triofox and the key to disaster. [Research Saturday]

John Hammond, Principal Security Researcher at Huntress, dives deep into the critical CVE-2025-30406 vulnerability affecting Gladinet CentreStack and Triofox. He shares alarming findings about how this vulnerability allows remote code execution via hardcoded keys, with hundreds of servers already compromised. John discusses the importance of endpoint security, the risks of deserialization, and proactive measures organizations can take to protect themselves. His insights underscore the urgent need for patching and security awareness among system administrators.
undefined
May 30, 2025 • 37min

All systems not go.

Matt Covington, VP of Product at Black Cloak, sheds light on cutting-edge impersonation techniques like deepfakes and the critical need for digital executive protection. He discusses alarming cybersecurity incidents, from recent DDoS attacks to the implications of regulatory changes in U.S. and Australia. Covington also emphasizes the new Browser-in-the-Middle attack targeting Safari users and provides insights on maintaining privacy and security amidst evolving threats.
undefined
8 snips
May 29, 2025 • 32min

When "out of the box" becomes "out of control."

Tim Starks, a senior reporter at CyberScoop specializing in cybersecurity, dives into pressing issues like the controversial collection of children's DNA for criminal databases. He highlights a troubling malware incident involving ASUS routers and new tactics from the APT41 group using Google Calendar for attacks. The discussion also covers the Salt Typhoon breach, revealing serious national security failures and the need for better public-private collaboration. Additionally, Starks addresses Victoria's Secret facing a significant cybersecurity crisis and its potential impact on consumer data.
undefined
May 28, 2025 • 35min

Fingers point east.

Tony Velleca, CEO of CyberProof, brings insights on exposure management and risk-focused strategies in cybersecurity. He dives into how organizations can prioritize threats against a backdrop of a rising tide of cyberespionage activities, including allegations against Chinese hackers. The discussion sheds light on the alarming growth of AI-driven malware and highlights the need for proactive security measures. Velleca emphasizes tailored risk assessments and the importance of collaboration among security teams to counter these evolving threats effectively.
undefined
4 snips
May 27, 2025 • 36min

BEAR-ly washed and dangerous.

A notorious cyber threat actor, Laundry Bear, focuses on NATO cyber espionage as vulnerabilities in cybersecurity tools are laid bare. The rising tide of ransomware attacks, including one that hit Nova Scotia Power, highlights the urgent need for effective defenses. Discussions delve into securing AI adoption, spotlighting the risks of shadow AI amidst innovation. An intriguing anecdote reveals a CIA secret site's unexpected connection to Star Wars fandom, blending cybersecurity with pop culture in a surprising twist.
undefined
May 26, 2025 • 38min

Hugh Thompson on Building the RSA Conference [Afternoon Cyber Tea]

Hugh Thompson, Executive Chairman of RSA Conference and expert in cybersecurity, chats with Ann Johnson. They dive into the intricate planning of the world’s largest cybersecurity conference, touching on unique themes and even a surprise llama on the expo floor. Hugh reflects on his journey from applying mathematics to enhancing cybersecurity and emphasizes the industry's growing relevance. He shares personal stories about family and the humor in cybersecurity challenges, fostering an optimistic outlook for the future of the field.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app