CyberWire Daily

N2K Networks
undefined
Oct 27, 2023 • 28min

Social engineering as a blunt instrument–almost like swatting without the middleman.

This podcast discusses Eastern European gangs working with anglophone criminals, a critical vulnerability in Mirth Connect, a mercenary spyware strain, phishing attacks disguised as PepsiCo, the FCC's renewed interest in Net Neutrality, insights on measuring risk from Wade Baker, and Europol's view on quantum computing and law enforcement.
undefined
Oct 26, 2023 • 30min

Some intelligence services understand the value of being underestimated.

Guest Seth Blank from Valimail discusses email security and DMARC. Topics include cyber espionage operations, DDoS attacks, hacktivist actions, EU sanctions, Elon Musk's memes, and the challenges of governing unstructured data. The importance of zero trust security and the value of DMARC as a security tool are also explored.
undefined
Oct 25, 2023 • 30min

AI ain’t misbehavin’, except when it does. Also, privateers and hacktivist auxiliaries get busy.

Sherrod DeGrippo and Jay Bhalodia discuss AI-generated phishing lures vs. human-made templates. Winter Vyvern cyber attacks on European government entities are explored, along with insights on multi-cloud security. The importance of managing and securing the multi-cloud environment is highlighted, and the challenges and opportunities of adopting a multi-cloud approach are discussed.
undefined
Oct 24, 2023 • 28min

Two new things to worry about: how long it takes to read the fine print, and bed bug disinformation.

DDoS activity during Hamas-Israeli war, cyber incident reported by insurance firm, recent cybercrime arrests. Building secure tech from start with Comcast. Cybersecurity challenges for enterprises. Disinformation campaign about bed bugs. Challenges of retiring old tools.
undefined
Oct 23, 2023 • 30min

How people get over on the content moderators.

Joe Oregon from CISA discusses a tabletop exercise for the next Super Bowl. Malek Ben Salem describes code models. Topics include data exposure incidents, zero-day vulnerabilities, Chinese espionage, hiring North Korean IT workers, cyber attacks on humanitarian organizations, content moderation challenges, cyber-attack on the International Criminal Court, collaborative relationships, cybersecurity habits, and considerations for using code models.
undefined
Oct 22, 2023 • 8min

Jennifer Reed: Balance the gender scales. [Principal] [Career Notes]

Jennifer Reed, Principal Solutions Architect at Amazon Web Services (AWS), shares her journey in the tech field, overcoming gender discrimination and serving in the war in Iraq. She discusses the importance of data security, software development, and data privacy in improving security posture. Reed emphasizes the need to protect people's data and make it easier for others to overcome barriers.
undefined
Oct 21, 2023 • 18min

AMBERSQUID hides in the depths. [Research Saturday]

Sysdig's researchers discuss their work on the AMBERSQUID Cloud-Native Cryptojacking Operation, targeting supposedly secure AWS services. The operation exploits services without triggering AWS resource approval, posing challenges in finding and eliminating miners. The podcast covers the tactics and strategies used by attackers for crypto mining, the challenges of detecting malicious services in AWS environments, and highlights the research conducted by Sysdig.
undefined
Oct 20, 2023 • 32min

Disinformation and its often overlooked potential for denial-of-services.

Topics include hacktivism in the Hamas-Israel war, cyberespionage by OilRig, bomb threats in the Baltic, Casio's customer data breach, FCC's net neutrality proposal, vulnerabilities in MOVEit transfer, bridging the cyber talent gap, and the takedown of RagnarLocker gang.
undefined
Oct 19, 2023 • 32min

Vigilance isn’t purely receptive. Without criticism, it will become blind with detail.

Kate Naunheim, Cyber Risk Management Director at Unit 42, discusses new cybersecurity regulations introduced by the SEC. Topics include exploitation of vulnerabilities, data leakage, risks of QR codes, anti-phishing guidance, and influence operations. Also mentioned are the 10th anniversary of ATT&CKcon, the importance of open-source intelligence, and the significance of the MITRE ATTACK framework in cybersecurity.
undefined
Oct 18, 2023 • 35min

Hacktivist discipline is inversely correlated with sincerity of commitment.

Hamas-Israel conflict involves hacktivism and accusations in a hospital strike. New ransomware and cryptojacking campaign discovered. Preparing for post-quantum security. Challenges and best practices of corporate re-skilling program in telecom industry. Senator's opposition to cyber legislation. Limited cybersecurity activity in conflict.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app