2,000 episodes

The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.

CyberWire Daily N2K Networks

    • News
    • 4.0 • 1 Rating

The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.

    Jennifer Walsmith: Pioneering and defining possible. [Cyber Solutions] [Career Notes]

    Jennifer Walsmith: Pioneering and defining possible. [Cyber Solutions] [Career Notes]

    Vice President for Cyber and Information Solutions within Mission Systems at Northrop Grumman, Jennifer Walsmith takes us on her pioneering career journey. Following in her father's footsteps at the National Security Agency, Jennifer began her career out of high school in computer systems analysis. Jennifer notes she saw the value of a college degree and at her parents' urging attended night school. She completed her bachelors in computer science at University of Maryland, Baltimore County with the support of the NSA. Jennifer talks about the support of her team at NSA where she was one of the first women to have a career and a family, raising two children while working. Upon retirement from government service, Jennifer chose an organization with values that closely matched her own and uses her position to help her team define possible where they sometimes think they can't. We thank Jennifer for sharing her story with us.

    • 9 min
    If there's something strange in your neighborhood, don't call Facebook.

    If there's something strange in your neighborhood, don't call Facebook.

    Facebook's Secret Mission to Unmask Snapchat. The White House wants AI audits. Hackers exploit the open-source Ray AI framework. Finnish Police ID those responsible for the 2021 parliament breach. Operation FlightNight targets Indian government and energy sectors. Chinese APT groups target ASEAN entities. A notorious robocaller is rung up for nearly ten million dollars. In our latest Learning Layer, join Sam Meisenberg as he unpacks the intricacies of the CISSP diagnostic with Joe Carrigan from Johns Hopkins University. And Ann Johnson from Microsoft's Afternoon Cyber Tea visits the world of Smashing Security with Graham Cluley and Carole Theriault . And the UK’s watchers need watching.
    Remember to leave us a 5-star rating and review in your favorite podcast app.
    Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

    CyberWire Guests
    Join us for part three as this Learning Layer special series continues. Learning Layer host Sam Meisenberg talks with Joe Carrigan from Johns Hopkins University Information Security Institute, and co-host of Hacking Humans podcast. In this segment, they continue to discuss the results of Joe's CISSP diagnostic and dive deep into one of the assessment questions. Learn more about ISC2’s Certified Information Systems Security Professional (CISSP) certification, and explore our online certification courses, practice tests, and labs that ensure that you’re ready for exam day.
    Microsoft Security’s Ann Johnson, host of the Afternoon Cyber Tea podcast, goes inside the Smashing Security podcast with Graham Cluley and Carole Theriault. 
    Selected Reading
    Facebook snooped on users’ Snapchat traffic in secret project, documents reveal (TechCrunch)
    NTIA Pushes for Independent Audits of AI Systems (GovInfo Security)
    Thousands of companies using Ray framework exposed to cyberattacks, researchers say (The Record)
    Finland confirms APT31 hackers behind 2021 parliament breach (BleepingComputer)
    Operation FlightNight: Indian Government Entities and Energy Sector Targeted by Cyber Espionage Campaign (EclecticIQ)
    Chinese Hackers Target ASEAN Entities in Espionage Campaign (Infosecurity Magazine)
    Federal Court Enters $9.9M Penalty and Injunction Against Man Found to Have Caused Thousands of Unlawful Spoofed Robocalls (US Department of Justice)
    UK counter-eavesdropping agency gets slap on the wrist for eavesdropping (The Record) 

    Share your feedback.
    We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

    Want to hear your company in the show?
    You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
    The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.

    • 37 min
    Exposing Muddled Libra's meticulous tactics with Incident Responder Stephanie Regan [Threat Vector]

    Exposing Muddled Libra's meticulous tactics with Incident Responder Stephanie Regan [Threat Vector]

    In honor of Women's History Month, please enjoy this episode of the Palo Alto Networks Unit 42's Threat Vector podcast featuring host David Moulton's discussion with Jacqueline Wudyka about the SEC's Cybersecurity Law.

    In this episode, join host David Moulton as he speaks with Stephanie Regan, a senior consultant at Unit 42. Stephanie, with a background in law enforcement, specializes in compromise assessment and incident response. Discover her insights into combating the Muddled Libra threat group and similar adversaries.
    Stephanie highlights the crucial role of reconnaissance in investigations and the importance of strong multi-factor authentication (MFA) to counter phishing and social engineering attacks. She delves into techniques like domain typo squatting and shares how domain monitoring can thwart attackers.
    Learn how Unit 42 assists clients in recovering from attacks, especially those by Muddled Libra. Stephanie emphasizes rapid response and coordination, including using out-of-band communications to outmaneuver threat actors.

    You can learn more about Muddled Libra at
    https://unit42.paloaltonetworks.com/muddled-libra/ where Kristopher was the lead author for the Threat Group Assessment: Muddled Libra.

    Join the conversation on our social media channels:
    Website: ⁠https://www.paloaltonetworks.com/unit42⁠
    Threat Research: ⁠https://unit42.paloaltonetworks.com/⁠
    Facebook: ⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠
    LinkedIn: ⁠https://www.linkedin.com/company/unit42/⁠
    YouTube: ⁠@PaloAltoNetworksUnit42⁠
    Twitter: ⁠https://twitter.com/PaloAltoNtwks⁠

    About Threat Vector
    Unit 42 Threat Vector is the compass in the world of cyberthreats. Hear about Unit 42’s unique threat intelligence insights, new threat actor TTPs, real-world case studies, and learn how the team works together to discover these threats. Unit 42 will equip listeners with the knowledge and insight to proactively prepare and stay ahead in the ever-evolving threat landscape.

    PALO ALTO NETWORKS
    Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. ⁠http://paloaltonetworks.com⁠

    • 7 min
    The great firewall breached: China's covert cyber assault on America exposed.

    The great firewall breached: China's covert cyber assault on America exposed.

    An alleged sinister hacking plot by China. CISA and the FBI issued a 'secure-by-design' alert. Ransomware hits municipalities in Florida and Texas. The EU sets regulations to safeguard the upcoming European Parliament elections. ReversingLabs describe a suspicious NuGet package. Senator Bill Cassidy questions a costly breach at HHS. A data center landlord sues over requests to reveal its customers. On our Industry Voices segment, Jason Kikta, CISO & Senior Vice President of Product at Automox, discusses ways to increase IT efficiency while avoiding tool overload & complexity. And Google's AI Throws Users a Malicious Bone.
    Remember to leave us a 5-star rating and review in your favorite podcast app.
    Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

    CyberWire Guest
    On our Industry Voices segment, Jason Kikta, CISO & Senior Vice President of Product at Automox, discusses ways to increase IT efficiency including automation & tool streamlining, IT automation/automated patching, and tool overload & complexity. You can learn more in Automox’s 2024 State of IT Operations Research Report.

    Selected Reading
    Millions of Americans caught up in Chinese hacking plot (BBC)
    US Government Urges Software Makers to Eliminate SQL Injection Vulnerabilities (SecurityWeek)
    CISA adds FortiClient EMS, Ivanti EPM CSA, Nice Linear eMerge E3-Series bugs to its Known Exploited Vulnerabilities catalog (Security Affairs)
    St. Cloud most recent in string of Florida cities hit with ransomware (The Record)
    Hackers demand $700K in ransomware attack on Tarrant Appraisal District (MSN)
    The impact of compromised backups on ransomware outcomes (Sophos News)
    EU sets rules for Big Tech to tackle interference in European Parliament elections (The Record)
    Suspicious NuGet package grabs data from industrial systems (ReversingLabs)
    Senator demands answers from HHS about $7.5 million cyber theft in 2023 (The Record)
    Data center landlord refuses Fairfax County demand for tenant information (Washington Business Journal)
    Google's AI-powered search feature recommends malicious sites, including scams and malware (TechSpot)

    Share your feedback.
    We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

    Want to hear your company in the show?
    You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
    The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.

    • 34 min
    Dr. Rois Ni Thuama: Get into the game. [Cyber governance] [Career Notes]

    Dr. Rois Ni Thuama: Get into the game. [Cyber governance] [Career Notes]

    Head of Cyber Governance with Red Sift, Dr. Rois Ni Thuama shares the circuitous route of her career into cyber governance. She notes the route "looks really clean, but actually it was a bit more Jeremy Bearimy." While at Trinity College, Rois was moved to be part of history unfolding in South Africa and pause her studies. While there, she began making music videos and wildlife documentaries. Upon her return to London, Rois started working in corporate governance and risk at a music technology startup. This ignited her enthusiasm for startups. She now works in a company with several coworkers from that tech startup doing cyber governance. Rois advises law students of many ways into the industry including doing coding, learning risk management, and understanding privacy legislation, and then "just get into the game." We thank Rois for sharing her story. 

    • 9 min
    Python developers under attack.

    Python developers under attack.

    A supply chain attack targets python developers. Russia targets German political parties. Romanian and Spanish police dismantle a cyber-fraud gang. Pwn2Own prompts quick patches from Mozilla. President Biden nominates the first assistant secretary of defense for cyber policy at the Pentagon. An influential think tank calls for a dedicated cyber service in the US. Unit42 tracks a StrelaStealer surge. GM reverses its data sharing practice. Our guest is Anna Belak, Director of the Office of Cybersecurity Strategy at Sysdig, who shares trends in cloud-native security. And a Fordham Law School professor suggests AI creators take a page from medical doctors. 
    Remember to leave us a 5-star rating and review in your favorite podcast app.
    Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

    CyberWire Guest
    Guest Anna Belak, Director of the Office of Cybersecurity Strategy at Sysdig, shares trends in cloud-native security. To learn more, you can check out Sysdig’s 2024 Cloud-Native Security and Usage Report. 

    Selected Reading
    Top Python Developers Hacked in Sophisticated Supply Chain Attack (SecurityWeek)
    Russian hackers target German political parties with WineLoader malware (Bleeping Computer)
    Police Bust Multimillion-Dollar Holiday Fraud Gang (Infosecurity Magazine)
    Mozilla Patches Firefox Zero-Days Exploited at Pwn2Own (SecurityWeek)
    Biden nominates first assistant defense secretary for cyber policy (Nextgov/FCW)
    Pentagon, Congress have a ‘limited window’ to properly create a Cyber Force (The Record)
    StrelaStealer targeted over 100 organizations across the EU and US (Security Affairs)
    General Motors Quits Sharing Driving Behavior With Data Brokers (The New York Times)
    AI's Hippocratic Oath by Chinmayi Sharma (SSRN)

    Share your feedback.
    We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

    Want to hear your company in the show?
    You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
    The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.

    • 34 min

Customer Reviews

4.0 out of 5
1 Rating

1 Rating

Top Podcasts In News

Ellinofreneia Official
Digital Minds
ΤΟ ΒΗΜΑ Σήμερα
Alter Ego Media
ΤΡΑΥΜΑ
iMEdD Podcasts
Explainer
NEWS 24/7 | Σταύρος Διοσκουρίδης
Ράδιο «Κ» | Kathimerini
Kathimerini & Digital Minds
Uncut
OneMan | Αμπατζής - Κανελλόπουλος

You Might Also Like

Cyber Security Headlines
CISO Series
Cybersecurity Today
ITWC
Hacking Humans
N2K Networks
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)
Johannes B. Ullrich
Malicious Life
Malicious Life
Smashing Security
Graham Cluley & Carole Theriault