2,000 episodes

The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.

CyberWire Daily N2K Networks

    • News
    • 4.8 • 942 Ratings

The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.

    Ransomware strikes a nerve.

    Ransomware strikes a nerve.

    The U.S. blood supply is under pressure from a ransomware attack. CrowdStrike shareholders sue the company. There’s a critical vulnerability in Bitdefender’s GravityZone Update Server. BingoMod RAT targets Android users. Hackers use Google Ads to trick users into a fake Google Authenticator app. Western Sydney University confirms a major data breach. Marylands leads the way in gift card scam prevention. NSA is all-in on AI. My guest is David Moulton, host of Palo Alto Networks' podcast Threat Vector. Attention marketers: AI isn’t the buzzword you think it is. 
    Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

    CyberWire Guest
    David Moulton, host of Palo Alto Networks' podcast Threat Vector and Director of Thought Leadership, discussing the evolution of his show and what we can expect to see coming next. You can catch the latest episode of Threat Vector where David welcomes Palo Alto Networks Founder and CTO Nir Zuk here.

    Selected Reading
    Ransomware attack on major US blood center prompts hundreds of hospitals to implement shortage protocols (The Record)
    CrowdStrike sued by shareholders over global outage (BBC)
    Bitdefender Flaw Let Attackers Trigger Server-Side Request Forgery Attacks (GB Hackers)
    BingoMod Android RAT Wipes Devices After Stealing Money (SecurityWeek)
    Google being impersonated on Google Ads by scammers peddling fake Authenticator (Cybernews)
    Western Sydney University reveals full scope of January data breach (Cyber Daily)
    Maryland becomes first state to pass law against gift card draining (CBS News)
    More than 7,000 NSA analysts are using generative AI tools, director says (Defense One)
    Study Finds Consumers Are Actively Turned Off by Products That Use AI (Futurism)

    Share your feedback.
    We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

    Want to hear your company in the show?
    You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
    The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
    Learn more about your ad choices. Visit megaphone.fm/adchoices

    • 30 min
    When DDoS and defense collide.

    When DDoS and defense collide.

    A global Microsoft outage takes down Outlook and Minecraft. The US Senate passes The Kids Online Safety and Privacy Act. Lame Duck domain names are targets for takeovers. A GeoServer vulnerability exposes thousands to remote code execution. China proposes a national internet ID. Email attacks surge dramatically in 2024. Columbus Ohio thwarts a ransomware attack. When it comes to invading your privacy, the Paris 2024 Olympics app goes for the gold. Our guest is Rakesh Nair, Senior Vice President of Engineering and Product at Devo, discussing the issues that security teams face when dealing with data control and data orchestration. Was it really Windows 3.1 that saved Southwest Airlines?
    Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

    CyberWire Guest
    Our guest is Rakesh Nair, Senior Vice President of Engineering and Product at Devo, discussing the issues that security teams face when dealing with data control and data orchestration. You can read more here. 

    Selected Reading
    Microsoft apologises after thousands report new outage (BBC News)
    Microsoft: Ransomware gangs exploit VMware ESXi auth bypass in attacks (Bleeping Computer)
    Senate Passes Bill to Protect Kids Online and Make Tech Companies Accountable for Harmful Content (SecurityWeek)
    Don’t Let Your Domain Name Become a “Sitting Duck” (Krebs on Security)
    Hackers Actively Exploiting GeoServer RCE Flaw, 6635 Servers Vulnerable (Cyber Security News)
    China Wants to Start a National Internet ID System (The New York Times)
    Email Attacks Surge, Ransomware Threat Remains Elevated (Security Boulevard)
    Columbus says it thwarted overseas ransomware attack that caused tech shutdown (Dispatch)
    Gold rush for data: Paris 2024 Olympic apps are eavesdropping on users (Cyber News)
    No, Southwest Airlines is not still using Windows 3.1 (OSnews) 

    Share your feedback.
    We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

    Want to hear your company in the show?
    You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
    The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
    Learn more about your ad choices. Visit megaphone.fm/adchoices

    • 34 min
    Breaking Bad (records).

    Breaking Bad (records).

    ZScaler uncovers the largest ransomware payment to date. IBM says the average cost of a breach is closing in on five million dollars. Hackers exploited Proofpoint's email protection platform to send millions of phishing emails. NIST launches Dioptra to test ML models. AcidPour targets Linux data storage devices for wiping. WhatsApp for Windows allows Python to run wild. The White House releases the National Standards Strategy for Critical and Emerging Technology (USG NSSCET) Implementation Roadmap. A bipartisan Senate bill aims to fund cybersecurity apprenticeships. CISA adds three exploits to its vulnerability catalog. Ben Yelin joins us today to discuss a U.S. District Court judge’s recent dismissal of charges against SolarWinds. Loose lips sink ships, but leaky HDMI cables flood the airwaves with digital data. 
    Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

    CyberWire Guest
    Ben Yelin, co-host of our Caveat podcast and Program Director, Public Policy & External Affairs at University of Maryland Center for Health and Homeland Security, joins us today to discuss the U.S. District Court judge dismissing most charges against SolarWinds. For more detail on the SolarWinds decision, check out this article. 

    Selected Reading
    Zscaler just uncovered what could be the largest ransomware payment of all time (ITPro)
    Hackers exploit Proofpoint to send millions of phishing emails (Tech Monitor)
    Average data breach cost jumps to $4.88 million, collateral damage increased (Help Net Security)
    NIST releases open-source platform for AI safety testing (SC Media)
    AcidPour Malware Attacking Linux Data Storage Devices To Wipe Out Data (GB Hackers)
    WhatsApp for Windows lets Python, PHP scripts execute with no warning (Bleeping Computer)
    US government debuts Implementation Roadmap for national standards strategy on critical and emerging technologies (Industrial Cyber)
    Bipartisan Senate bill would promote cybersecurity apprenticeship programs (CyberScoop)
    CISA warns of three new critical exploited vulnerabilities (The Stack)
    AI can reveal what’s on your screen via signals leaking from cables (New Scientist)

    Share your feedback.
    We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

    Want to hear your company in the show?
    You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
    The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
    Learn more about your ad choices. Visit megaphone.fm/adchoices

    • 32 min
    Are North Korean hackers going 'Seoul' searching?

    Are North Korean hackers going 'Seoul' searching?

    South Korea investigates a substantial leak of military intelligence to the north. Google fixes a Workspace authentication weakness. Wiz identifies an API authentication vulnerability in Selenium Grid. The UK’s Science Secretary warns Britain is highly vulnerable to cyber threats. Global shipping faces a surge in cyber attacks. Apple has resolved the iCloud Private Relay outage. Google Chrome offers to scan encrypted archives for malware. Barath Raghavan and Bruce Schneier examine the brittleness of modern IT infrastructure. Guest Brian Gumbel, President and COO at Dataminr, joins us to discuss the convergence of cyber-physical realms. Rick Howard previews his latest CSO Perspectives episode on the state of Zero Trust. Teaching AI crawlers some manners.
    Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

    CyberWire Guest
    Guest Brian Gumbel, President and COO at Dataminr, joins us to discuss the convergence of cyber-physical realms. Cybersecurity is no longer just a matter of protecting data on servers or computers, a cyber-attack can have tangible, real-world consequences.

    CSO Perspectives
    This week on N2K Pro’s CSO Perspectives podcast, host and N2K CSO Rick Howard focuses on “The current state of zero trust.” Hear a bit about it from Rick and Dave. You can find the full episode here if you are an N2K Pro subscriber, otherwise check out an extended sample here. 

    Selected Reading
    South Korea Reports Leak From Its Military Intelligence Command (New York Times)
    Crooks Bypassed Google’s Email Verification to Create Workspace Accounts, Access 3rd-Party Services (Krebs on Security)
    Selenium Grid Instances Exploited for Cryptomining (SecurityWeek)
    UK ‘desperately exposed’ to cyber-threats and pandemics, says minister | UK security and counter-terrorism (The Guardian)
    Cyber attacks on shipping rise amid geopolitical tensions (Financial Times)
    Apple Fixes iCloud Private Relay After Extended Outage (MacRumors)
    Chrome now asking for ZIP archive passwords to help detect malicious files (Cybernews)
    The CrowdStrike Outage and Market-Driven Brittleness (Lawfare)
    AI crawlers need to be more respectful (Read the Docs)

    Share your feedback.
    We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

    Want to hear your company in the show?
    You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
    The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
    Learn more about your ad choices. Visit megaphone.fm/adchoices

    • 39 min
    The current state of the zero trust.

    The current state of the zero trust.

    Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses the current state of zero trust with CyberWire Hash Table guest John Kindervag, the originator of the zero trust idea.

    References:
    Jonathan Jones, 2011. “Six Honest Serving Men” by Rudyard Kipling [Video]. YouTube.
    Dave Bittner, Rick Howard, John Kindervag, Kapil Raina, 2021. Zeroing in on zero trust. [Podcast]. CyberWire-X Podcast - N2K Cyberwire.
    Dawn Cappelli, Andrew Moore, Randall Trzeciak, 2012. The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud)  [Book]. SEI Series in Software Engineering). Goodreads. 
    Rick Howard, 2023. Cybersecurity First Principles: A Reboot of Strategy and Tactics [Book]. Goodreads.
    John Kindervag, 2010. No More Chewy Centers: Introducing The Zero Trust Model Of Information Security [White Paper]. Palo Alto Networks.
    Learn more about your ad choices. Visit megaphone.fm/adchoices

    • 18 min
    Encore: Camille Stewart: Technology becomes more of an equalizer. [Legal] [Career Notes]

    Encore: Camille Stewart: Technology becomes more of an equalizer. [Legal] [Career Notes]

    Cybersecurity attorney Camille Stewart shares how her childhood affinity for making contracts pointed to her eventual career as an attorney. Having a computer scientist father contributed to Camille's technical acumen and desire to include technology in her life's work. Camille has worked various facets of cybersecurity law from the private sector, federal government, on the Hill and in the Executive Branch, and now as part of Big Tech as Head of Security Policy and Election Integrity for Google Play and Android where she creates policy geared towards making sure users are safe on their platform and equipped to make informed decisions.. We thank Camille for sharing her story with us.
    Learn more about your ad choices. Visit megaphone.fm/adchoices

    • 7 min

Customer Reviews

4.8 out of 5
942 Ratings

942 Ratings

Steve Kingah ,

Exquisite

Cyberwire is simply the best in this space. Rich and to the point.

Damien Lewke ,

I love this show, it’s my non negotiable

I’ve been listening to the Cyberwire for over seven years. As a happy Cyberwire Pro (yes I forked over the $$ for the premium version) customer I must say this show is the only non negotiable daily podcast I listen to. I GENUINELY cannot recommend this show to anyone who’s new to or highly experienced in cyber. I used this to bring myself up to speed when I was new in industry and a decade in, I still find value in it every day!! Five stars

[REDACTED] USER ,

You just subscribed to all of their podcasts with ads about their content…

UPDATE: You just subscribed to all of their podcasts… 5-10 mins of actual content with 15-20 mins of ads including inserting their other podcasts in the Cyberwire Daily podcast. I don't recommend this podcast to anyone who values their time. There is plenty of other shows that give you the content you want. Too much hassle. Weird how things are managed at this place. Including changing names. I suspect they pay their marketing team more than content team.

PREVIOUS UPDATE: I now can listen again! Great podcast! It now plays using VPNs with anti malware/anti tracking VPNs. I would really like to listen again without disabling antimalware/antitracking VPNs. Please change your publishing settings to allow. PREVIOUS UPDATE: Podcast doesn’t play when connected to VPN that uses anti malware technology. Weird why that is an issue with this podcast a few others… Will you please fix this? Most non-cyberwire podcasts play without any issues. I suspect it’s a setting within how you publish your content. Podcast does play with VPN with anti malware tech turned off. Previous PREVIOUS UPDATE: I’m enjoying the podcast again and getting news about cybersecurity. Previously Previous PREVIOUS REVIEW: STOP reporting on non cybersecurity news. Cyberwire not Newswire! If I wanted to listen to news unrelated to cybersecurity, I’d listen to mainstream media… Stick to what people tune into for. Maybe cut show length if you’re having to make up nonsense to fill the show. Otherwise, A good daily 30 min podcast about cybers Good podcast content. Some interviews are great.

Top Podcasts In News

The Daily
The New York Times
Pod Save America
Crooked Media
The Tucker Carlson Show
Tucker Carlson Network
Up First
NPR
The Ben Shapiro Show
The Daily Wire
The Megyn Kelly Show
SiriusXM

You Might Also Like

Cyber Security Headlines
CISO Series
Hacking Humans
N2K Networks
Cybersecurity Today
Howard Solomon
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)
Johannes B. Ullrich
Smashing Security
Graham Cluley & Carole Theriault
Malicious Life
Malicious Life