
CyberWire Daily
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
Latest episodes

5 snips
Feb 13, 2025 • 35min
Salt in the wound.
In this podcast, Jason Baker, Principal Security Consultant at GuidePoint Security and ransomware expert, discusses the alarming evolution of ransomware and cyber threats. He highlights the ongoing activities of Russian and Chinese cyber groups, such as Salt Typhoon and Seashell Blizzard, and their attacks on critical sectors. The conversation also delves into the implications of a massive IoT data breach and how AI advancements could intensify cyber risks. Baker emphasizes the importance of adapting our defenses to an ever-evolving cyber landscape.

11 snips
Feb 12, 2025 • 35min
DOGEgeddon: The cyber crisis hiding in plain sight.
Gianna Whitver, co-host of the Breaking Through in Cybersecurity Marketing podcast, shares her insights on pressing cyber threats. The discussion includes concerns over the potential cyberattack tied to DOGE and updates on a new national cyber director nomination. They delve into a North Korean laptop farm case and emphasize the urgent need for better cybersecurity strategies within government systems. Whitver also highlights innovative marketing tactics and the role of community building in cybersecurity.

Feb 11, 2025 • 35min
Apple’s race to secure your iPhone.
In this engaging conversation, John Fokker, Head of Threat Intelligence at Trellix, sheds light on the alarming convergence of nation-state actors and cybercriminals. He discusses Apple’s crucial security updates addressing a zero-day vulnerability that threatens iPhone users. The dialogue also dives into the rising brute-force attacks on edge devices and the complexities of incident response. Fokker emphasizes the urgent need for legislation to protect encryption, highlighting the intricate dance between security and rising cyber threats.

Feb 10, 2025 • 31min
Read all about it—or maybe not.
Mike Woodard, VP of Product Management for App Security at Digital.ai, shares insights on minimizing risks when deploying AI in cybersecurity. He discusses the importance of vendor vetting and legal compliance, as well as the evolving landscape of cyber threats. The conversation highlights cybersecurity challenges such as a significant cyberattack on newspapers and the need for quantum-safe technology. Woodard also provides practical tips for secure Wi-Fi passwords, showcasing the critical balance between leveraging AI's benefits and ensuring data protection.

Feb 9, 2025 • 8min
Avi Shua: Try to do things by yourself. [CEO] [Career Notes]
Avi Shua, CEO and co-founder of Orca Security, inspires listeners with his journey from a curious teen hacktivist to a cybersecurity leader. He shares insights from his unique training with the Israeli Army's Intelligence Unit 8200, emphasizing the value of independent problem-solving. Avi advocates for simplifying cybersecurity practices so that professionals can focus on their core responsibilities, while also encouraging newcomers to find their passion in the field. His vision aims to elevate security work beyond mere troubleshooting.

20 snips
Feb 8, 2025 • 22min
Cleo’s trojan horse. [Research Saturday]
Mark Manglicmot, SVP of Security Services at Arctic Wolf, is a cybersecurity expert who dives into the Cleopatra mass exploitation campaign. He discusses the alarming use of a Java backdoor, which attackers deploy via PowerShell stagers, exploiting vulnerabilities in Cleo's MFT software. Mark highlights the ongoing challenges in cybersecurity, emphasizing the need for proactive measures and vigilance against evolving threats. He also stresses the importance of software updates and robust vulnerability management to fend off sophisticated tactics like those used in the Cleopatra campaign.

17 snips
Feb 7, 2025 • 37min
DOGE-eat-DOGE world.
John Anthony Smith, Founder and Chief Security Officer at Fenix24, dives into the world of cyber resilience and the importance of data backups. He discusses the rise of AI-related security concerns, including vulnerabilities in popular platforms like DeepSeek and Microsoft Outlook. The conversation highlights the risks of phishing campaigns and emerging threats from malicious machine learning models. Smith emphasizes the need for preparedness and proper testing to combat modern cyber threats, making a compelling case for organizations to rethink their security strategies.

16 snips
Feb 6, 2025 • 44min
FCC around and find out.
Cliff Crosland, CEO and co-founder of Scanner.dev, shares insights on the evolving landscape of cybersecurity from a data management perspective. He delves into the concept of security data lakes, emphasizing their role in threat hunting and response. The discussion highlights the advantages of a 'bring your own' model, allowing organizations greater control over their data while utilizing vendor tools. With ransomware attacks declining, Crosland also touches on the importance of maintaining resilience and integrating innovative tools to navigate modern security challenges.

10 snips
Feb 5, 2025 • 33min
DOGE days numbered?
The DOGE team is under fire as the cryptocurrency market evolves. There's critical news about a macOS vulnerability allowing serious exploits. CISA has released new advisories for industrial control systems. Cybersecurity job shortages are stirring legislative responses. Google’s take on AI ethics shifts amidst global tensions. And for those eyeing career growth, there are insights on mastering crucial cybersecurity certifications. All this and more keeps listeners on the cutting edge of digital security!

11 snips
Feb 4, 2025 • 33min
A wolf in DOGE’s clothing?
Concerns arise as DOGE gains unchecked access to federal networks, sparking cybersecurity fears. Senator Hawley's AI ban raises free speech issues while Apple faces a massive data exposure. North Korean malware cleverly targets job seekers on macOS. The latest Android security update addresses multiple vulnerabilities, and a Grubhub breach reveals personal data risks. Texas prepares to launch its Cyber Command amidst rising threats. Lastly, the vulnerabilities of new AI models like DeepSeek come under scrutiny, highlighting the need for cautious adoption.
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.