2,000 episodes

The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.

CyberWire Daily N2K Networks

    • News
    • 2.0 • 1 Rating

The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.

    AWS in Orbit: Monitoring critical road infrastructure at scale with Alteia and the World Bank. [T-Minus AWS in Orbit]

    AWS in Orbit: Monitoring critical road infrastructure at scale with Alteia and the World Bank. [T-Minus AWS in Orbit]

    You can learn more about AWS in Orbit at space.n2k.com/aws.
    Baptiste Tripard is the Chief Marketing Officer at Alteia. Aiga Stokenberga is the Senior Transport Economist at the World Bank.
    We explore how Alteia and the World Bank are leveraging AWS's cloud, AI, and space capabilities to monitor critical road networks at scale to support large scale infrastructure investments. From road networks to bridges, they share real-world applications that are making a difference in emerging economies.
    AWS in Orbit is a podcast collaboration between N2K and AWS to offer listeners an in-depth look at the transformative intersection of cloud computing, space technologies, and generative AI. You can learn more about AWS in Orbit at space.n2k.com/aws.
    Remember to leave us a 5-star rating and review in your favorite podcast app.
    Miss an episode? Sign-up for our weekly intelligence roundup, Signals and Space, and you’ll never miss a beat. And be sure to follow T-Minus on LinkedIn and Instagram.
    Selected Reading
    AWS Aerospace and Satellite
    AWS re:Invent
    Alteia and the World Bank assess and enhance road infrastructure data quality at scale using AWS
    Audience Survey
    We want to hear from you! Please complete our short survey. It’ll help us get better and deliver you the most mission-critical space intel every day.
    Want to hear your company in the show?
    You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at space@n2k.com to request more info.
    Want to join us for an interview?
    Please send your pitch to space-editor@n2k.com and include your name, affiliation, and topic proposal.
    T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.

    • 38 min
    A battle against malware.

    A battle against malware.

    PyPI puts a temporary hold on operations. OMB outlines federal AI governance. Germany sounds the alarm on Microsoft Exchange server updates. Cisco patches potential denial of service vulnerabilities. The US puts a big bounty on BlackCat. Darcula and Tycoon are sophisticated phishing as a service platforms. Don’t dilly-dally on the latest Chrome update. On our Threat Vector segment, host David Moulton has guest Sam Rubin, VP and Global Head of Operations at Unit 42, to discuss Sam's testimony to the US Congress on the multifaceted landscape of ransomware attacks, AI, and automation, the need for more cybersecurity education. And Data brokers reveal alleged visitors to pedophile island. 
    Remember to leave us a 5-star rating and review in your favorite podcast app.
    Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

    CyberWire Guest
    On the Threat Vector segment, host David Moulton has guest Sam Rubin, VP and Global Head of Operations at Unit 42. They discuss Sam's testimony to the US Congress on the multifaceted landscape of ransomware attacks, AI, and automation, the need for more cybersecurity education and more. Listen to the full episode with David and Sam's in-depth discussion. Read Sam Rubin's testimony.

    Selected Reading
    PyPi Is Under Attack: Project Creation and User Registration Suspended (Malware News)
    OMB Issues First Governmentwide AI Risk Mitigation Rules (GovInfo Security)
    German cyber agency warns 17,000 Microsoft Exchange servers are vulnerable to critical bugs (The Record)
    Cisco Patches DoS Vulnerabilities in Networking Products (Security Week)
    US offers a $10 million bounty for information on UnitedHealth hackers (ITPro)
    IPhone Users Beware! Darcula Phishing Service Attacking Via IMessage (GB Hackers)
    Tycoon 2FA, the popular phishing kit built to bypass Microsoft and Gmail 2FA security protections, just got a major upgrade — and it’s now even harder to detect (ITPro)
    Update Chrome now! Google patches possible drive-by vulnerability (Malwarebytes)
    Jeffrey Epstein's Island Visitors Exposed by Data Broker (WIRED) 

    Share your feedback.
    We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

    Want to hear your company in the show?
    You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
    The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2024 N2K Networks, Inc.

    • 32 min
    Jennifer Walsmith: Pioneering and defining possible. [Cyber Solutions] [Career Notes]

    Jennifer Walsmith: Pioneering and defining possible. [Cyber Solutions] [Career Notes]

    Vice President for Cyber and Information Solutions within Mission Systems at Northrop Grumman, Jennifer Walsmith takes us on her pioneering career journey. Following in her father's footsteps at the National Security Agency, Jennifer began her career out of high school in computer systems analysis. Jennifer notes she saw the value of a college degree and at her parents' urging attended night school. She completed her bachelors in computer science at University of Maryland, Baltimore County with the support of the NSA. Jennifer talks about the support of her team at NSA where she was one of the first women to have a career and a family, raising two children while working. Upon retirement from government service, Jennifer chose an organization with values that closely matched her own and uses her position to help her team define possible where they sometimes think they can't. We thank Jennifer for sharing her story with us.

    • 9 min
    If there's something strange in your neighborhood, don't call Facebook.

    If there's something strange in your neighborhood, don't call Facebook.

    Facebook's Secret Mission to Unmask Snapchat. The White House wants AI audits. Hackers exploit the open-source Ray AI framework. Finnish Police ID those responsible for the 2021 parliament breach. Operation FlightNight targets Indian government and energy sectors. Chinese APT groups target ASEAN entities. A notorious robocaller is rung up for nearly ten million dollars. In our latest Learning Layer, join Sam Meisenberg as he unpacks the intricacies of the CISSP diagnostic with Joe Carrigan from Johns Hopkins University. And Ann Johnson from Microsoft's Afternoon Cyber Tea visits the world of Smashing Security with Graham Cluley and Carole Theriault . And the UK’s watchers need watching.
    Remember to leave us a 5-star rating and review in your favorite podcast app.
    Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

    CyberWire Guests
    Join us for part three as this Learning Layer special series continues. Learning Layer host Sam Meisenberg talks with Joe Carrigan from Johns Hopkins University Information Security Institute, and co-host of Hacking Humans podcast. In this segment, they continue to discuss the results of Joe's CISSP diagnostic and dive deep into one of the assessment questions. Learn more about ISC2’s Certified Information Systems Security Professional (CISSP) certification, and explore our online certification courses, practice tests, and labs that ensure that you’re ready for exam day.
    Microsoft Security’s Ann Johnson, host of the Afternoon Cyber Tea podcast, goes inside the Smashing Security podcast with Graham Cluley and Carole Theriault. 
    Selected Reading
    Facebook snooped on users’ Snapchat traffic in secret project, documents reveal (TechCrunch)
    NTIA Pushes for Independent Audits of AI Systems (GovInfo Security)
    Thousands of companies using Ray framework exposed to cyberattacks, researchers say (The Record)
    Finland confirms APT31 hackers behind 2021 parliament breach (BleepingComputer)
    Operation FlightNight: Indian Government Entities and Energy Sector Targeted by Cyber Espionage Campaign (EclecticIQ)
    Chinese Hackers Target ASEAN Entities in Espionage Campaign (Infosecurity Magazine)
    Federal Court Enters $9.9M Penalty and Injunction Against Man Found to Have Caused Thousands of Unlawful Spoofed Robocalls (US Department of Justice)
    UK counter-eavesdropping agency gets slap on the wrist for eavesdropping (The Record) 

    Share your feedback.
    We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

    Want to hear your company in the show?
    You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
    The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.

    • 37 min
    Exposing Muddled Libra's meticulous tactics with Incident Responder Stephanie Regan [Threat Vector]

    Exposing Muddled Libra's meticulous tactics with Incident Responder Stephanie Regan [Threat Vector]

    In honor of Women's History Month, please enjoy this episode of the Palo Alto Networks Unit 42's Threat Vector podcast featuring host David Moulton's discussion with Jacqueline Wudyka about the SEC's Cybersecurity Law.

    In this episode, join host David Moulton as he speaks with Stephanie Regan, a senior consultant at Unit 42. Stephanie, with a background in law enforcement, specializes in compromise assessment and incident response. Discover her insights into combating the Muddled Libra threat group and similar adversaries.
    Stephanie highlights the crucial role of reconnaissance in investigations and the importance of strong multi-factor authentication (MFA) to counter phishing and social engineering attacks. She delves into techniques like domain typo squatting and shares how domain monitoring can thwart attackers.
    Learn how Unit 42 assists clients in recovering from attacks, especially those by Muddled Libra. Stephanie emphasizes rapid response and coordination, including using out-of-band communications to outmaneuver threat actors.

    You can learn more about Muddled Libra at
    https://unit42.paloaltonetworks.com/muddled-libra/ where Kristopher was the lead author for the Threat Group Assessment: Muddled Libra.

    Join the conversation on our social media channels:
    Website: ⁠https://www.paloaltonetworks.com/unit42⁠
    Threat Research: ⁠https://unit42.paloaltonetworks.com/⁠
    Facebook: ⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠
    LinkedIn: ⁠https://www.linkedin.com/company/unit42/⁠
    YouTube: ⁠@PaloAltoNetworksUnit42⁠
    Twitter: ⁠https://twitter.com/PaloAltoNtwks⁠

    About Threat Vector
    Unit 42 Threat Vector is the compass in the world of cyberthreats. Hear about Unit 42’s unique threat intelligence insights, new threat actor TTPs, real-world case studies, and learn how the team works together to discover these threats. Unit 42 will equip listeners with the knowledge and insight to proactively prepare and stay ahead in the ever-evolving threat landscape.

    PALO ALTO NETWORKS
    Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. ⁠http://paloaltonetworks.com⁠

    • 7 min
    The great firewall breached: China's covert cyber assault on America exposed.

    The great firewall breached: China's covert cyber assault on America exposed.

    An alleged sinister hacking plot by China. CISA and the FBI issued a 'secure-by-design' alert. Ransomware hits municipalities in Florida and Texas. The EU sets regulations to safeguard the upcoming European Parliament elections. ReversingLabs describe a suspicious NuGet package. Senator Bill Cassidy questions a costly breach at HHS. A data center landlord sues over requests to reveal its customers. On our Industry Voices segment, Jason Kikta, CISO & Senior Vice President of Product at Automox, discusses ways to increase IT efficiency while avoiding tool overload & complexity. And Google's AI Throws Users a Malicious Bone.
    Remember to leave us a 5-star rating and review in your favorite podcast app.
    Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

    CyberWire Guest
    On our Industry Voices segment, Jason Kikta, CISO & Senior Vice President of Product at Automox, discusses ways to increase IT efficiency including automation & tool streamlining, IT automation/automated patching, and tool overload & complexity. You can learn more in Automox’s 2024 State of IT Operations Research Report.

    Selected Reading
    Millions of Americans caught up in Chinese hacking plot (BBC)
    US Government Urges Software Makers to Eliminate SQL Injection Vulnerabilities (SecurityWeek)
    CISA adds FortiClient EMS, Ivanti EPM CSA, Nice Linear eMerge E3-Series bugs to its Known Exploited Vulnerabilities catalog (Security Affairs)
    St. Cloud most recent in string of Florida cities hit with ransomware (The Record)
    Hackers demand $700K in ransomware attack on Tarrant Appraisal District (MSN)
    The impact of compromised backups on ransomware outcomes (Sophos News)
    EU sets rules for Big Tech to tackle interference in European Parliament elections (The Record)
    Suspicious NuGet package grabs data from industrial systems (ReversingLabs)
    Senator demands answers from HHS about $7.5 million cyber theft in 2023 (The Record)
    Data center landlord refuses Fairfax County demand for tenant information (Washington Business Journal)
    Google's AI-powered search feature recommends malicious sites, including scams and malware (TechSpot)

    Share your feedback.
    We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

    Want to hear your company in the show?
    You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
    The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.

    • 34 min

Customer Reviews

2.0 out of 5
1 Rating

1 Rating

Top Podcasts In News

Global News Podcast
BBC World Service
The Global Story
BBC World Service
Bloomberg Businessweek
Bloomberg
The Bulwark Podcast
The Bulwark Podcast
CNN 5 Things
CNN
Amanpour
CNN

You Might Also Like

Cyber Security Headlines
CISO Series
Cybersecurity Today
ITWC
Hacking Humans
N2K Networks
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)
Johannes B. Ullrich
Malicious Life
Malicious Life
Smashing Security
Graham Cluley & Carole Theriault