

CyberWire Daily
N2K Networks
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
Episodes
Mentioned books

Jul 9, 2024 • 30min
Uniting against APT40.
Caroline Wong, CSO at Cobalt, discusses pentesting & AI in cybersecurity. UK's NCSC alerts on APT40, Frankfurt Uni cyberattack, CloudSorcerer spying on Russian agencies, CISA addressing security flaws. Cybersecurity funding rises. Ticketmaster faces scalper challenges.

Jul 8, 2024 • 28min
The age old battle between iPhone and Android.
Topics include Microsoft switching employees in China from Android to iPhones, security flaws in Mastodon, OpenAI breach, 10 billion leaked passwords, CISA requested more info on January hack, Egyptian Health Dept breach, NHLS ransomware attack, Eldorado ransomware, Cisco vulnerability, and discussion on extending security around genAI.

Jul 7, 2024 • 7min
Encore: Richard Clarke: From presidential inspiration to cybersecurity policy pioneer. [Policy] [Career Notes]
Richard Clarke, a cybersecurity pioneer, shares his journey from being inspired by President Kennedy to creating the first cybersecurity position in federal government. He worked for the Department of Defense and the White House, focusing on counterterrorism and raising cybersecurity awareness. Clarke continues to advise CISOs through Good Harbor Security Risk Management.

Jul 6, 2024 • 19min
Encore: Welcome to New York, it's been waitin' for you. [Research Saturday]
Cybersecurity expert Joshua Miller from Proofpoint discusses TA453's phishing attack on a US-based think tank. Topics include Iran's cyber threats, malicious VPN app targeting Macs, analysis of Mac malware, and recommendations against persistent threat actors.

22 snips
Jul 5, 2024 • 43min
Deep dive into the 2024 Incident Response Report with Unit 42's Michael "Siko" Sikorski [Threat Vector]
Unit 42's CTO and VP of Engineering, Michael Sikorski, discusses the 2024 Incident Response Report, highlighting cyber threats like AI use, software vulnerabilities, 'living off the land' attacks, and business disruption supply chain attacks. Recommendations on incident response strategies and mitigating cyber threats are shared.

Jul 4, 2024 • 23min
Encore: The curious case of the missing IcedID. [Only Malware in the Building]
Dave Bittner, cybersecurity expert, and Selena Larson discuss the disappearance of IcedID malware and the emergence of Latrodectus, both tied to ransomware. They explore the transition, cybercrime dynamics, and connections between the two malware variants, highlighting the need to address initial access threats.

Jul 3, 2024 • 27min
The Supreme Court is bringing a judicial shakeup.
The podcast discusses the Supreme Court overturning Chevron deference affecting cyber regulations, revealing online sex abusers with stolen credentials, CISA's updates for online maritime resilience tools, Patelco Credit Union's ransomware attack, arrests in a vishing fraud scheme, Splunk's critical vulnerabilities, HHS fining a Health System for HIPAA violations, and Joe Carrigan's CISSP certification journey.

Jul 2, 2024 • 29min
Take a trip down regreSSHion lane.
Cybersecurity expert Johannes Ullrich talks defending against API attacks and new ransomware threats like Volcano Demon. They discuss a new OpenSSH vulnerability, Chinese hackers exploiting a Cisco zero-day, and unauthorized access at HubSpot. Google launches a KVM bug bounty program while addressing dangerous attack techniques and the impact of AI on cybersecurity.

Jul 1, 2024 • 22min
A swift fix for a serious router bug.
The guest Rick Howard discusses topics such as emergency patches for router vulnerabilities, phishing attacks, data breaches, Trojanized software installers, and the importance of identity and access management in implementing a Zero Trust strategy.

Jul 1, 2024 • 16min
The current state of IAM: A Rick-the-toolman episode.
Guests Ted Wagner and Cassio Sampaio discuss the current state of Identity and Access Management, emphasizing Zero Trust security concepts and the importance of IAM in cybersecurity. They explore challenges in workforce and customer identity, the evolution of authentication methods, and address password insecurity.


