CyberWire Daily

N2K Networks
undefined
Jul 14, 2025 • 28min

Taxing times for cyber fraudsters.

Cynthia Kaiser, Senior Vice President at Halcyon’s Ransomware Research Center and former FBI Cyber Division leader, dives into the world of cyber fraud. She reveals the tactics of Scattered Spider, a group known for sophisticated social engineering and aggressive business targeting. The discussion extends to vulnerabilities in systems, including a major tax fraud scheme leading to arrests, and the rise of ransomware threats. Kaiser emphasizes the crucial need for enhanced cybersecurity measures as both luxury brands and other sectors face increasing risks.
undefined
12 snips
Jul 12, 2025 • 25min

Click here to steal. [Research Saturday]

Selena Larson, a Threat Researcher at Proofpoint and co-host of Only Malware in the Building, dives deep into the world of Amatera Stealer, a sophisticated rebranding of ACR Stealer. She reveals its advanced evasion techniques, including stealthy C2 communication and powerful PowerShell loaders. The discussion uncovers how Amatera employs creative social engineering and blockchain hosting to steal sensitive data, posing serious threats amid changing cybersecurity landscapes. Larson emphasizes the importance of heightened awareness and evolving defenses against such malware threats.
undefined
Jul 12, 2025 • 9min

MK Palmore: Lead from where you stand. [CISO] [Career Notes]

MK Palmore, Director of Google Cloud's Office of the CISO, shares his incredible journey from the US Marine Corps to the FBI and into cybersecurity. He opens up about his childhood dreams and the challenges he faced growing up in Washington, D.C. MK underscores the importance of mentorship and resilience in navigating career transitions. He passionately advocates for diversity, equity, and inclusion within the cybersecurity industry, emphasizing the need for leaders to uplift underrepresented voices.
undefined
16 snips
Jul 11, 2025 • 26min

Behind the firewall, trouble brews.

Catherine Woneis, VP of Product at Fingerprint, sheds light on the escalating issue of music royalty fraud driven by bots. She reveals how fraudsters use AI-generated music and fake artists to manipulate streaming metrics, raking in millions. The discussion also touches on critical cybersecurity vulnerabilities, including flaws in popular software, and the broader implications of AI on security. Woneis emphasizes the necessity for companies to adopt robust bot detection solutions amid the ongoing digital fraud battle.
undefined
60 snips
Jul 10, 2025 • 30min

Cybercrime has a hefty price tag.

Ben Yelin, co-host of the Caveat podcast and a legal expert in technology policy, joins to discuss alarming trends in cybercrime and cybersecurity. UK police have arrested suspects connected to major retail cyberattacks, while international arrests highlight rising geopolitical tensions. Yelin and Ethan Cook dive into Congress' contentious attempt to regulate AI at the federal level, challenging state authority. They also tackle pressing issues like password insecurity, emphasizing the critical need for better governance in the digital age.
undefined
9 snips
Jul 9, 2025 • 24min

Plug-ins gone rogue.

Patch Tuesday reveals critical vulnerabilities, urging swift action from IT admins. An Iranian ransomware group targets U.S. and Israeli interests, while new spyware strains exploit Russian industries. Browser extensions are found to have infected millions, posing significant risks. Joe Carrigan sheds light on a savvy phishing scam aimed at CFOs, showcasing evolving tactics in cybercrime. Plus, the surprising question: can our feline friends outsmart algorithms? All this and more makes for a captivating discussion on today’s cybersecurity landscape.
undefined
12 snips
Jul 8, 2025 • 25min

Memory leaks and login sneaks.

Discover the latest in cybersecurity as researchers reveal proof-of-concept exploits for CitrixBleed2 and Grafana rolls out urgent patches for critical vulnerabilities. A hacker claims a breach at Spanish telecom giant Telefónica, while a new ransomware group called BERT is on the rise. In an eye-opening discussion, experts highlight security risks in low-code platforms and integrated development environments. Plus, a staggering data leak affects millions of job seekers, raising concerns about personal data security in the digital age.
undefined
6 snips
Jul 7, 2025 • 31min

SafePay, unsafe day.

Rob Allen, Chief Product Officer at ThreatLocker, discusses the pressing issue of security fatigue in cybersecurity. He argues that a 'Default Deny' strategy can mitigate this problem by enhancing security without overwhelming users. Recent high-profile cyber incidents, including a ransomware attack on Ingram Micro, highlight the evolving landscape of cybercrime and the need for smarter security measures. Allen also emphasizes the importance of user education in combating insider threats and improving compliance.
undefined
Jul 6, 2025 • 11min

Swati Shekhar: Challenges increase your risk appetite. [Engineering] [Career Notes]

Swati Shekhar, Head of Engineering at Ground Labs, shares her inspiring journey into the engineering world, marked by challenges and growth. She reveals how her early days as one of the few women in a male-dominated college sparked her resilience and risk appetite. Swati emphasizes the importance of stepping out of comfort zones and finding authenticity in career choices. She reflects on her transition from individual contributor to empathetic leader, highlighting teamwork and the power of effective communication in shaping a positive work culture.
undefined
17 snips
Jul 5, 2025 • 20min

Botnet’s back, tell a friend. [Research Saturday]

Silas Cutler, Principal Security Researcher at Censys, dives into the elusive Volt Typhoon threat group in this discussion. He reveals how recent FBI disruptions targeted the KV Botnet yet left its control infrastructure largely intact. The conversation uncovers the botnet's surprising resilience, with shifts in control servers hinting at adaptive strategies. Cutler emphasizes the challenges in attributing cyber threats and the importance of collaborative cybersecurity efforts to tackle nation-state actors and safeguard critical systems.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app