

CyberWire Daily
N2K Networks
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
Episodes
Mentioned books

Jul 14, 2025 • 28min
Taxing times for cyber fraudsters.
Cynthia Kaiser, Senior Vice President at Halcyon’s Ransomware Research Center and former FBI Cyber Division leader, dives into the world of cyber fraud. She reveals the tactics of Scattered Spider, a group known for sophisticated social engineering and aggressive business targeting. The discussion extends to vulnerabilities in systems, including a major tax fraud scheme leading to arrests, and the rise of ransomware threats. Kaiser emphasizes the crucial need for enhanced cybersecurity measures as both luxury brands and other sectors face increasing risks.

12 snips
Jul 12, 2025 • 25min
Click here to steal. [Research Saturday]
Selena Larson, a Threat Researcher at Proofpoint and co-host of Only Malware in the Building, dives deep into the world of Amatera Stealer, a sophisticated rebranding of ACR Stealer. She reveals its advanced evasion techniques, including stealthy C2 communication and powerful PowerShell loaders. The discussion uncovers how Amatera employs creative social engineering and blockchain hosting to steal sensitive data, posing serious threats amid changing cybersecurity landscapes. Larson emphasizes the importance of heightened awareness and evolving defenses against such malware threats.

Jul 12, 2025 • 9min
MK Palmore: Lead from where you stand. [CISO] [Career Notes]
MK Palmore, Director of Google Cloud's Office of the CISO, shares his incredible journey from the US Marine Corps to the FBI and into cybersecurity. He opens up about his childhood dreams and the challenges he faced growing up in Washington, D.C. MK underscores the importance of mentorship and resilience in navigating career transitions. He passionately advocates for diversity, equity, and inclusion within the cybersecurity industry, emphasizing the need for leaders to uplift underrepresented voices.

16 snips
Jul 11, 2025 • 26min
Behind the firewall, trouble brews.
Catherine Woneis, VP of Product at Fingerprint, sheds light on the escalating issue of music royalty fraud driven by bots. She reveals how fraudsters use AI-generated music and fake artists to manipulate streaming metrics, raking in millions. The discussion also touches on critical cybersecurity vulnerabilities, including flaws in popular software, and the broader implications of AI on security. Woneis emphasizes the necessity for companies to adopt robust bot detection solutions amid the ongoing digital fraud battle.

60 snips
Jul 10, 2025 • 30min
Cybercrime has a hefty price tag.
Ben Yelin, co-host of the Caveat podcast and a legal expert in technology policy, joins to discuss alarming trends in cybercrime and cybersecurity. UK police have arrested suspects connected to major retail cyberattacks, while international arrests highlight rising geopolitical tensions. Yelin and Ethan Cook dive into Congress' contentious attempt to regulate AI at the federal level, challenging state authority. They also tackle pressing issues like password insecurity, emphasizing the critical need for better governance in the digital age.

9 snips
Jul 9, 2025 • 24min
Plug-ins gone rogue.
Patch Tuesday reveals critical vulnerabilities, urging swift action from IT admins. An Iranian ransomware group targets U.S. and Israeli interests, while new spyware strains exploit Russian industries. Browser extensions are found to have infected millions, posing significant risks. Joe Carrigan sheds light on a savvy phishing scam aimed at CFOs, showcasing evolving tactics in cybercrime. Plus, the surprising question: can our feline friends outsmart algorithms? All this and more makes for a captivating discussion on today’s cybersecurity landscape.

12 snips
Jul 8, 2025 • 25min
Memory leaks and login sneaks.
Discover the latest in cybersecurity as researchers reveal proof-of-concept exploits for CitrixBleed2 and Grafana rolls out urgent patches for critical vulnerabilities. A hacker claims a breach at Spanish telecom giant Telefónica, while a new ransomware group called BERT is on the rise. In an eye-opening discussion, experts highlight security risks in low-code platforms and integrated development environments. Plus, a staggering data leak affects millions of job seekers, raising concerns about personal data security in the digital age.

6 snips
Jul 7, 2025 • 31min
SafePay, unsafe day.
Rob Allen, Chief Product Officer at ThreatLocker, discusses the pressing issue of security fatigue in cybersecurity. He argues that a 'Default Deny' strategy can mitigate this problem by enhancing security without overwhelming users. Recent high-profile cyber incidents, including a ransomware attack on Ingram Micro, highlight the evolving landscape of cybercrime and the need for smarter security measures. Allen also emphasizes the importance of user education in combating insider threats and improving compliance.

Jul 6, 2025 • 11min
Swati Shekhar: Challenges increase your risk appetite. [Engineering] [Career Notes]
Swati Shekhar, Head of Engineering at Ground Labs, shares her inspiring journey into the engineering world, marked by challenges and growth. She reveals how her early days as one of the few women in a male-dominated college sparked her resilience and risk appetite. Swati emphasizes the importance of stepping out of comfort zones and finding authenticity in career choices. She reflects on her transition from individual contributor to empathetic leader, highlighting teamwork and the power of effective communication in shaping a positive work culture.

17 snips
Jul 5, 2025 • 20min
Botnet’s back, tell a friend. [Research Saturday]
Silas Cutler, Principal Security Researcher at Censys, dives into the elusive Volt Typhoon threat group in this discussion. He reveals how recent FBI disruptions targeted the KV Botnet yet left its control infrastructure largely intact. The conversation uncovers the botnet's surprising resilience, with shifts in control servers hinting at adaptive strategies. Cutler emphasizes the challenges in attributing cyber threats and the importance of collaborative cybersecurity efforts to tackle nation-state actors and safeguard critical systems.