2,000 episodes

The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.

CyberWire Daily N2K Networks

    • News
    • 5.0 • 2 Ratings

The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.

    Encore: Geoff White: Suddenly all of the pieces start to line up. [Journalism] [Career Notes]

    Encore: Geoff White: Suddenly all of the pieces start to line up. [Journalism] [Career Notes]

    Investigative journalist and author Geoff White talks about tracing a line through the dots of his career covering technology. Geoff shares that he has always been "quite geeky," but came to covering technology after several roles in the journalism industry. Newspapers, magazines and television were all media Geoff worked in before covering technology. Geoff got into journalism not due to the glamour sometimes associated with it, but because he wanted to fight for the public to cover stories that helped those who didn't have massive amounts of money, power or a huge lobbying campaign in political circles. When writing his book, Crime Dot Com, Geoff reflected on the cybercrime and cybersecurity stories he's covered and saw how things started falling into place. Our thanks to Geoff for sharing his story with us. 
    Learn more about your ad choices. Visit megaphone.fm/adchoices

    • 7 min
    You Might Also Like: The Ramsey Show

    You Might Also Like: The Ramsey Show

    Introducing What’s My Next Right Step With Money? from The Ramsey Show.
    Follow the show: The Ramsey Show
    💵 Sign-up for EveryDollar today - The simplest way to budget for your life!
    Dave Ramsey & Dr. John Delony answer your questions and discuss:

    "I'm afraid to talk to my family about money,"

    "My wife feels like she owes me money,"

    "I need some financial direction,"

    "My son is unemployed and is losing his home,"

    "Can I get Dave's blessing to buy a new expensive car?"

    "Should I work for less pay if it's more fulfilling?"

    "Can I build wealth on a tight budget?"


    📞 Have a question for the show? Call 888-825-5225 Weekdays from 2-5pm ET or click here!

    Support Our Sponsors:

    Zander Insurance

    Churchill Mortgage

    The Chosen

    BetterHelp

    Neighborly


    Next Steps
    🎟️It's game on! Get your ticket for Total Money Makeover Weekend. 
    📄Need help with your taxes? See who we trust.

    Listen to more from Ramsey Network
    🎙️ The Ramsey Show  
    🧠 The Dr. John Delony Show
    🍸 Smart Money Happy Hour
    💡 The Rachel Cruze Show
    💸 The Ramsey Show Highlights
    💰 George Kamel
    💼 The Ken Coleman Show
    📈 EntreLeadership

    Learn more about your ad choices. https://www.megaphone.fm/adchoices
    Ramsey Solutions Privacy PolicyDISCLAIMER: Please note, this is an independent podcast episode not affiliated with, endorsed by, or produced in conjunction with the host podcast feed or any of its media entities. The views and opinions expressed in this episode are solely those of the creators and guests. For any concerns, please reach out to team@podroll.fm.

    Riding the hype for new Arc browser. [Rsearch Saturday]

    Riding the hype for new Arc browser. [Rsearch Saturday]

    Jérôme Segura, Senior Director of Threat Intelligence at Malwarebytes, is discussing their work on "Threat actors ride the hype for newly released Arc browser." The Arc browser, newly released for Windows, has quickly garnered positive reviews but has also attracted cybercriminals who are using deceptive Google search ads to distribute malware disguised as the browser.
    These malicious campaigns exploit the hype around Arc, using techniques like embedding malware in image files and utilizing the MEGA cloud platform for command and control, highlighting the need for caution with sponsored search results and the effectiveness of Endpoint Detection and Response (EDR) systems.
    The research can be found here:
    Threat actors ride the hype for newly released Arc browser

    Learn more about your ad choices. Visit megaphone.fm/adchoices

    • 27 min
    A snapshot of security woes.

    A snapshot of security woes.

    Microsoft's recall raises red flags. SolarWinds fixes flaws unearthed by NATO. Ukraine's CERT sounds alarm. Russian hacktivists cause trouble in EU elections. DEVCORE uncovers critical code execution flaw. LastPass leaves users locked out. Apple commits to five years of iPhone security. An AI mail fail. Inside the FCC's plan to strengthen BGP protocol. Dave sits down with our guest Camille Stewart Gloster, Former Deputy National Cyber Director at the White House, as she shares a retrospective of her public service career. And let’s all Cheers to cybersecurity.
    Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
    Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

    CyberWire Guest
    Guest Camille Stewart Gloster, Former Deputy National Cyber Director at the White House, shares a retrospective of her public service career. Camille’s full conversation with Dave can be found on our weekly cybersecurity law, policy and privacy podcast, Caveat. You can listen to it here. 

    Selected Reading
    Microsoft’s Recall Feature Is Even More Hackable Than You Thought (WIRED)
    Microsoft Research scientist gives non-answer when asked about Windows Recall privacy concerns (TechSpot) 
    TotalRecall: A New Tool that Extracts Data From Windows 11 Recall Feature (Cyber Security News)
    Exclusive: Senators express "serious concern" with Pentagon's Microsoft plan (Axios)
    SolarWinds Patches High-Severity Vulnerability Reported by NATO Pentester (SecurityWeek) 
    UAC-0020 used SPECTR Malware to target Ukraine defense forces (Security Affairs) 
    Russian hacktivists vow mass attacks against EU elections (The Register)
    Ransomware Actor Exploited CoinMiner Attacker's Proxy Server (Cyber Security News)
    Critical PHP Remote Code Execution Flaw let Attackers Inject Malicious Scripts (Cyber Security News)
    Users furious after LastPass down for hours (Cybernews)
    Apple Says iPhones Will Get Security Updates for at Least 5 Years (SecurityWeek) 
    EmailGPT Exposed to Prompt Injection Attacks (Infosecurity Magazine)
    FCC Proposes BGP Security Reporting for Broadband Providers (SecurityWeek)
    Unpacking the SEC 10-K cyber disclosures (PwC) 
    Apple set to launch Passwords app, taking on LastPass and 1Password (TechSpot)
    Wineloader Mimic As Ambassador Of India To Start The Infection Chain (Cyber Security News) 

    Share your feedback.
    We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

    Want to hear your company in the show?
    You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
    The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
    Learn more about your ad choices. Visit megaphone.fm/adchoices

    • 32 min
    CISA's calls for a JCDC makeover.

    CISA's calls for a JCDC makeover.

    CSAC recommends key changes to the  Joint Cyber Defense Collaborative. Cloud vendor Snowflake says single-factor authentication is to blame in their recent breach. Publishers sue Google over pirated ebooks. The FBI shares LockBit decryption keys. V3B is a phishing as a service campaign targeting banking customers. Commando Cat targets Docker servers to deploy crypto miners. Our guest is Danny Allen, Snyk's CTO, discussing how in the rush to implement GenAI, some companies are bypassing best practices and security policies. Club Penguin fans stumble upon a cache of secrets in the house of mouse.
    Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
    Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

    CyberWire Guest
    Guest is Danny Allan, Snyk's CTO, discussing how in the rush to implement GenAI, companies bypass best practices and security policies. This highlights a clear gap between those in leadership looking to adopt AI tools and the teams who are utilizing them. Learn more in Snyk Organizational AI Readiness Report. 

    Selected Reading
    CISA advisors urge changes to JCDC's goals, operations, membership criteria (The Record)
    CISA says 'patch now' to 7-year-old Oracle WebLogic bug (The Register)
    Snowflake says users with single-factor authentication targeted in attack (SC Media)
    Advance Auto Parts stolen data for sale after Snowflake attack (Bleeping Computer)
    Major Publishers Sue Google Over Ads for Pirated Ebooks (Publishing Perspectives)
    FBI unveils 7,000 decryption keys to aid LockBit victims (Silicon Republic)
     Hackers Attacking Banking Customers Using Phishing-As-A-Service V3B Toolkit (GB Hackers)
    Commando Cat: A Novel Cryptojacking Attack Abusing Docker Remote API Servers (Trend Micro)
    Club Penguin fans breached Disney Confluence server, stole 2.5GB of data (Bleeping Computer) 

    Share your feedback.
    We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

    Want to hear your company in the show?
    You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
    The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
    Learn more about your ad choices. Visit megaphone.fm/adchoices

    • 29 min
    Opening up on hidden secrets.

    Opening up on hidden secrets.

    OpenAI insiders describe a culture of recklessness and secrecy. Concerns over Uganda’s biometric ID system. Sophos uncovers a Chinese cyberespionage operation called Crimson Palace. Poland aims to sure up cyber defenses against Russia. Zyxel warns of critical vulnerabilities in legacy NAS products. Arctic Wolf tracks an amateurish ransomware variant named Fog. A TikTok zero-day targets high profile accounts. Cisco patches a Webex vulnerability that exposed German government meetings. On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey, diving into Domain 7, Security Operations. A Canadian data breach leads to a class action payday. 
    Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
    Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

    Learning Layer
    On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey using N2K’s comprehensive CISSP training course, CISSP practice test, and CISSP practice labs. Sam and Joe dive into Domain 7, Security Operations, and tackle the following question:
    Which of the following is the MOST important goal of Disaster Recovery Planning?

    Business continuity

    Critical infrastructure restoration

    Human Safety

    Regulatory compliance


    Selected Reading
    OpenAI Whistle-Blowers Describe Reckless and Secretive Culture (The New York Times)
    Uganda: Yoweri Museveni's Critics Targeted Via Biometric ID System (Bloomberg)
    Chinese South China Sea Cyberespionage Campaign Unearthed (GovInfo Security)
    Palau confirms 'major' cyberattack, points to China (Digital Journal)
    Poland to invest $760 million in cyberdefense as Russian pressure mounts (The Record)
    'NsaRescueAngel' Backdoor Account Again Discovered in Zyxel Products (SecurityWeek)
    Arctic Wolf sniffs out new ransomware variant (CSO Online)
    CNN, Paris Hilton, and Sony TikTok accounts hacked via DMs (Security Affairs)
    Cisco Patches Webex Bugs Following Exposure of German Government Meetings (SecurityWeek)
    ICBC must pay $15K to all who had data breached before JIBC attacks (Vancouver Sun) 

    Share your feedback.
    We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

    Want to hear your company in the show?
    You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
    The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
    Learn more about your ad choices. Visit megaphone.fm/adchoices

    • 31 min

Customer Reviews

5.0 out of 5
2 Ratings

2 Ratings

Top Podcasts In News

Global News Podcast
BBC World Service
Morning Brief
BFM Media
BBK Network @ Podcast
BBK Network
Ringgit and Sense
BFM Media
Money Talks from The Economist
The Economist
Economist Podcasts
The Economist

You Might Also Like

Cyber Security Headlines
CISO Series
Hacking Humans
N2K Networks
Cybersecurity Today
ITWC
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)
Johannes B. Ullrich
Smashing Security
Graham Cluley & Carole Theriault
Malicious Life
Malicious Life