PodcastsActualitésCyberWire Daily

CyberWire Daily

N2K Networks
CyberWire Daily
Dernier épisode

3669 épisodes

  • CyberWire Daily

    The fixes keep coming.

    05/05/2026 | 38 min
    Brace for an AI-driven patch surge. Google fixes a critical Android flaw. Trellix confirms a source code breach. Apache Software Foundation ships urgent fixes. Data tied to Liberty Mutual leaks. CloudZ evolves to steal OTPs. Ouroboros persistence raises the stakes. A vishing suspect faces U.S. charges. Our guest is Markus Rauschecker, Executive Director for the University of Maryland Center for Cyber, Health and Hazard Strategies (CHHS), on the importance of the non-technical aspects of good cybersecurity preparedness and response. Our Threat Vector segment focuses on incident response. If you think UK age verification is working, I mustache you a question.

    Remember to leave us a 5-star rating and review in your favorite podcast app.

    Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

    Industry Voices

    Markus Rauschecker, Executive Director for the University of Maryland Center for Cyber, Health and Hazard Strategies (CHHS), discussing the importance of the non-technical aspects of good cybersecurity preparedness and response. If you enjoyed this conversation check out the full interview here.

    Threat Vector Segment

    On this segment of Threat Vector by Palo Alto Networks, host David Moulton speaks with guest Steve Elovitz. In this conversation, Steve reflects on what two decades of incident response actually teaches you about the people on the other side of a breach. You can listen to the full conversation here, and catch new episodes of Threat Vector every Thursday on your favorite podcast app.

    Selected Reading

    NCSC Warns of an AI-Fuelled “Vulnerability Patch Wave” (Infosecurity Magazine)

    AI Adoption Outpaces Safety Policies, Leaving Organizations Exposed (Infosecurity Magazine)

    Critical Remote Code Execution Vulnerability Patched in Android (SecurityWeek)

    Trellix Reveals Unauthorized Access to Source Code (Infosecurity Magazine)

    Critical, High-Severity Vulnerabilities Patched in Apache MINA, HTTP Server (SecurityWeek)

    Everest Group Begins Leaking Alleged Liberty Mutual Data (GovInfo Security)

    CloudZ malware abuses Microsoft Phone Link to steal SMS and OTPs (Bleeping Computer)

    dMSA Ouroboros: Self-Sustaining Credential Extraction in Windows Server 2025 (Huntress)

    Western District of North Carolina | Romanian National Appears in Federal Court Following Extradition from Romania on Bank Fraud Charges Stemming From “Vishing” Scheme (United States Department of Justice)

    Kids can bypass some age checks with a drawn-on mustache (The Register)

    Share your feedback.

    What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

    Want to hear your company in the show?

    N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

    The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
    Learn more about your ad choices. Visit megaphone.fm/adchoices
  • CyberWire Daily

    Security without a login screen.

    04/05/2026 | 24 min
    Progress Software urges customers to patch a critical MOVEit authentication bypass. Washington worries about limited access to advanced AI tools. Paid influencers promote pro-American AI. CISA warns Copy Fail is under active exploitation. The Canvas educational platform suffers a data breach. The Lazarus Group uses ClickFix to target high-value enterprise users. U.S. and Chinese authorities raid scam centers in Dubai. Monday Business Brief. On Afternoon Cyber Tea with Ann Johnson: Tony Sager, Senior VP & Chief Evangelist, Center for Internet Security, joins Ann to discuss the accelerating pace of technology, AI, and global software dependencies. May the Fourth be with your firewall. 

    Remember to leave us a 5-star rating and review in your favorite podcast app.

    Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

    Afternoon Cyber Tea

    On this segment of Afternoon Cyber Tea with Ann Johnson: Tony Sager, Senior VP & Chief Evangelist, Center for Internet Security, joins Ann to discuss how the accelerating pace of technology, AI, and global software dependencies are reshaping the cybersecurity landscape. To hear the full conversation, check out the episode and subscribe where you get your favorite podcasts to listen to past episodes. The show is going on hiatus. Stay tuned for the next chapter soon.

    Selected Reading

    ⁠Progress warns of critical MOVEit Automation auth bypass flaw⁠ (Bleeping Computer)

    ⁠What Was Discussed at Google’s White House Meeting About A.I. ⁠(The New York Times)

    ⁠US Military Reaches Deals With 7 Tech Companies to Use Their AI on Classified Systems ⁠(SecurityWeek)

    ⁠A Dark-Money Campaign Is Paying Influencers to Frame Chinese AI as a Threat⁠ (WIRED)

    ⁠CISA says ‘Copy Fail’ flaw now exploited to root Linux systems⁠ (Bleeping Computer)

    ⁠Edtech Firm Instructure Discloses Data Breach Amid Hacker Leak Threats⁠ (SecurityWeek)

    ⁠Lazarus Targets macOS Users With New “Mach-O Man” Malware Kit⁠ (GB Hackers)

    ⁠US, China partner on scam center takedown in Dubai⁠ (The Record)

    ⁠Cloudsmith raises $72 million in Series C funding.⁠ (N2K Pro Business Briefing)

    Microsoft for Startups (N2K Networks)

    Share your feedback.

    What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

    Want to hear your company in the show?

    N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

    The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
    Learn more about your ad choices. Visit megaphone.fm/adchoices
  • CyberWire Daily

    Kayla Williams: Not everything related to cybersecurity is a fire drill. [CISO] [Career Notes]

    03/05/2026 | 10 min
    Please enjoy this encore of Career Notes.

    Kayla Williams, CISO of Devo, sits down to share her story, from graduating with a finance degree to rising to where she is now. She quickly learned that finance was not for her and changed paths, working towards gaining an information security certificate. From there she was able to excel and was offered the opportunity to move to England which changed her life. Working in her new role, she really enjoys thriving with her team. She says "We really try to be the department of no problem versus the department of no." She mentions how her and her team work on a day to day basis together solving issues and yet she says not everything related to cybersecurity needs to be a fire drill. She would rather her and her team build bridges in the face of adversity and in the face of people who may be naysayers. We thank Kayla for sharing her story.
    Learn more about your ad choices. Visit megaphone.fm/adchoices
  • CyberWire Daily

    Double-edged threat. [Research Saturday]

    02/05/2026 | 2 min
    Today we are joined by Justin Albrecht, Principal Researcher at Lookout, discussing "Attackers Wielding DarkSword Threaten iOS Users." DarkSword is a highly sophisticated iOS exploit chain discovered by Lookout that targets iPhones (iOS 18.4–18.6.2), enabling near zero-click compromise and rapid theft of sensitive data, including credentials and cryptocurrency wallet information.

    Likely deployed by a Russia-linked threat actor (UNC6353) against Ukrainian users, it uses watering hole attacks on compromised websites and operates in a “hit-and-run” fashion—exfiltrating data within minutes before wiping traces. The campaign highlights a growing secondary market for advanced exploits, allowing financially motivated groups to access powerful tools once reserved for state actors, significantly expanding the mobile threat landscape.

    The research and executive brief can be found here:


    ⁠Attackers Wielding DarkSword Threaten iOS Users

    Learn more about your ad choices. Visit megaphone.fm/adchoices
  • CyberWire Daily

    Think before you deploy the agent.

    01/05/2026 | 30 min
    Five Eyes agencies issue agentic AI guidance. A federal database leaks Social Security numbers. A stealthy worm poisons open source packages. OT firms are sidelined from frontier cyber models. The FBI warns of a surge in cyber-enabled cargo theft. Officials flag likely election interference as security programs face cuts. Researchers uncover a covert Python backdoor. Ubuntu’s site takes Iranian-linked DDoS fire. Cyber pros are sentenced in a ransomware case. Our guest is Andrew Carr, Global Head of Threat Management at Booz Allen, discussing how AI is accelerating cyberattacks. OpenAI joins the invitation-only club.

    Remember to leave us a 5-star rating and review in your favorite podcast app.

    Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

    CyberWire Guest

    On today’s Industry Voices we are joined by ⁠Andrew Carr⁠, Global Head of Threat Management at ⁠Booz Allen Hamilton⁠, discussing how AI is accelerating cyberattacks and reshaping cybersecurity defenses. If you enjoyed this conversation be sure to check out the full interview here.

    Selected Reading

    Careful Adoption of Agentic AI Services (CISA) 

    Careful adoption of agentic AI services (Cyber.gov.au)

    Medicare portal exposed health providers’ Social Security numbers (The Washington Post)

    Open-source registries hit by 'Mini Shai-Hulud' supply chain attacks (Developer)

    OT Cybersecurity Frozen Out by Frontier Labs (OTToday)

    FBI Warns of Surge in Hacker-Enabled Cargo Theft (SecurityWeek)

    Breach Roundup: US Cyber Command Flags Election Threats (Gov Infosecurity)

    Sophisticated Deep#Door Backdoor Enables Espionage, Disruption (SecurityWeek)

    Pro-Iran group turns Ubuntu DDoS into shakedown (The Register)

    Two Americans Who Attacked Multiple U.S. Victims Using ALPHV BlackCat Ransomware Sentenced to Prison (United States Department of Justice)

    OpenAI locks GPT-5.5-Cyber behind velvet rope (The Register)

    Share your feedback.

    What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

    Want to hear your company in the show?

    N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

    The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
    Learn more about your ad choices. Visit megaphone.fm/adchoices

Plus de podcasts Actualités

À propos de CyberWire Daily

The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
Site web du podcast

Écoutez CyberWire Daily, LEGEND ou d'autres podcasts du monde entier - avec l'app de radio.fr

Obtenez l’app radio.fr
 gratuite

  • Ajout de radios et podcasts en favoris
  • Diffusion via Wi-Fi ou Bluetooth
  • Carplay & Android Auto compatibles
  • Et encore plus de fonctionnalités

CyberWire Daily: Podcasts du groupe

Applications
Réseaux sociaux
v8.8.14| © 2007-2026 radio.de GmbH
Generated: 5/6/2026 - 6:20:34 PM