2,000 episodes

The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.

CyberWire Daily N2K Networks

    • News

The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.

    Alleged leaked files expose a dirty secret.

    Alleged leaked files expose a dirty secret.

    An alleged leak of Google’s search algorithm contradicts the company’s public statements.  German researchers discover a critical vulnerability in a TP-Link router. Breachforums is back…maybe. The Seattle Public Library suffers a ransomware attack. A Georgia man gets ten years for money laundering and romance scams, and the Treasury department sanctions a group of botnet operators. 44,000 individuals are affected by the breach of a major U.S. title insurance company. Microsoft describes North Korea’s Moonstone Sleet. Advocating for a more architectural approach to cybersecurity. Maria Varmazis speaks with WiCyS Executive Director Lynn Dohm and a panel of N2K experts about the 2024 Cyber Talent Study. A cracked password results in a multimillion dollar windfall. 
    Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
    Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

    Learning Layer
    On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey using N2K’s comprehensive CISSP training course, CISSP practice test, and CISSP practice labs. Sam and Joe dive into Domain 6: Security Assessment and Testing and tackle the following question together:
    You are hiring a vendor to perform a penetration test that would simulate a breach from an insider threat. What type of test would be BEST to perform? 

    Blue Box

    Black Box

    White-hat hack

    White box


    CyberWire Guest
    Maria Varmazis, N2K host of T-Minus Space Daily, talks with WiCyS Executive Director Lynn Dohm and N2K's Simone Petrella, Dr. Heather Monthie, and Jeff Welgan about the 2024 Cyber Talent Study. You can find out more about the study here. 

    Selected Reading
    Google won’t comment on a potentially massive leak of its search algorithm documentation (The Verge)
    Update TP-Link's Archer C5400X router now to fix remote takeover vulnerability (TechSpot)
    Data leak site BreachForums is back, boasting Live Nation/Ticketmaster user data. But is it a trap? (Malwarebytes)
    Ransomware attack on Seattle Public Library knocks out online systems (The Record)
    Man Sentenced for Laundering Over $4.5M Obtained from Business Email Compromise and Romance Fraud Schemes (United States Department of Justice)
    Treasury Sanctions a Cybercrime Network Associated with the 911 S5 Botnet (United States Department of Treasury)
    First American December data breach impacts 44,000 people (Bleeping Computer)
    Moonstone Sleet emerges as new North Korean threat actor with new bag of tricks (Microsoft Security Blog)
    Cybersecurity at a crossroads: Time to shift to an architectural approach (CSO Online)
    How Researchers Cracked an 11-Year-Old Password to a $3 Million Crypto Wallet (WIRED) 

    Share your feedback.
    We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

    Want to hear your company in the show?
    You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
    The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.

    • 42 min
    FBI untangles the web that is Scattered Spider.

    FBI untangles the web that is Scattered Spider.

    The FBI untangles Scattered Spider. The RansomHub group puts a deadline on Christie’s. Prescription services warn customers of data breaches. Personal data from public sector workers in India is leaked online. Check Point says check your VPNs. The Internet Archive suffers DDoS attacks. A Minesweeper clone installs malicious scripts. N2K T-Minus Space Daily podcast host Maria Varmazis speaks with guest Carrie Hernandez Marshall, CEO and Co-Founder from Rebel Space Technologies, about the need to extend cybersecurity into space. If you can’t beat ‘em, troll ‘em. 
    Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
    Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

    CyberWire Guest
    N2K T-Minus Space Daily podcast host Maria Varmazis speaks with guest Carrie Hernandez Marshall, CEO and Co-Founder from Rebel Space Technologies, about the need to extend cybersecurity into space.

    Selected Reading
    Potent youth cybercrime ring made up of 1,000 people, FBI official says (CyberScoop)
    Christie’s given Friday ransom deadline after threat group claims responsibility for cyber attack (ITPro)
    Data Stolen From MediSecure for Sale on Dark Web (SecurityWeek)
    2.8 Million Impacted by Data Breach at Prescription Services Firm Sav-Rx (SecurityWeek)
    Data leak exposes personal data of Indian military and police (CSO Online)
    Check Point warns of threat actors targeting its VPNs (TechMonitor)
    Internet Archive Hit With DDoS Attack (PCMag)
    Hackers phish finance orgs using trojanized Minesweeper clone (bleepingcomputer)
    Cops Are Just Trolling Cybercriminals Now (WIRED)

    Share your feedback.
    We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

    Want to hear your company in the show?
    You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
    The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.

    • 39 min
    Memorial Day special.

    Memorial Day special.

    Rick Howard, N2K CyberWire’s Chief Analyst, CSO, and Senior Fellow, commemorates Memorial Day.
    References:
    Abraham Lincoln, 1863. The Gettysburg Address [Speech]. Abraham Lincoln Online.
    Amanda Onion, Original 2009, Updated 2023. Memorial Day 2022: Facts, Meaning & Traditions [Essay]. HISTORY.
    Brent Hugh, 2021. A Brief History of “John Brown’s Body” [Essay]. Digital History.
    Bob Zeller, 2022. How Many Died in the American Civil War? [Essay]. HISTORY.
    General George Marshall, 2014. President Lincoln’s Letter to Mrs Bixby [Movie Clip - Saving Private Ryan]. YouTube.
    JOHN LOGAN, 1868. Logan’s Order Mandating Memorial Day [Order]. John A. Logan College.
    John Williams, Chicago Symphony Orchestra, 2012. The People’s House: Lincoln (Original Motion Picture Soundtrack) [Song]. Apple Music.
    John Williams, Chicago Symphony Orchestra, 2012. The Blue and the Grey: Lincoln (Original Motion Picture Soundtrack) [Song]. Apple Music - Web Playe.
    Livia Albeck-Ripka, 2023. A Brief History of Memorial Day [Essay]. The New York Times.
    Paul Robeson, 2021. John Brown’s Body [Song]. YouTube.
    Robert Rodat (Writer), Steven Spielberg (Director), Harve Presnell (Actor), 1998. Saving Private Ryan [Movie]. IMDb.
    Staff, 2020. A Brief Biography of General John A. Logan [Biography]. John A. Logan College.
    Staff, 2024. Civil War Timeline [WWW Document], American Battlefield Trust.
    Thomas Jefferson, 1776. Declaration of Independence: [Transcription]. National Archives.
    Winston Churchil, 1940. Never was so much owed by so many to so few - Winston Churchill Speeches [Speech]. YouTube.

    • 19 min
    Encore: Richard Torres: Getting that level of experience is going to be crucial. [Security Operations] [Career Notes]

    Encore: Richard Torres: Getting that level of experience is going to be crucial. [Security Operations] [Career Notes]

    Director of security operations at Syntax Richard Torres talks about his path leading him working in juvenile justice to becoming a private investigator to physical security at a nuclear power plant to cybersecurity presently. Always a fan of police shows, Richard became a member of the Air Force Junior ROTC in high school and began his path there. Richard shares the challenges of working in several facets of the security industry including his transition from SWAT team member to cybersecurity. He notes the role that diplomacy plays when you're trying to get honesty and be steered in the right direction. Our thanks to Richard for sharing his story with us. 

    • 8 min
    International effort dismantles LockBit. [Research Saturday]

    International effort dismantles LockBit. [Research Saturday]

    Jon DiMaggio, a Chief Security Strategist at Analyst1, is sharing his work on "Ransomware Diaries Volume 5: Unmasking LockBit." On February 19, 2024, the National Crime Agency (NCA), a UK sovereign law enforcement agency, in collaboration with the FBI, Europol, and nine other countries under "Operation Cronos," disrupted the LockBit ransomware gang’s data leak site used for shaming, extorting, and leaking victim data.
    The NCA greeted visitors to LockBit’s dark web leak site with a seizure banner, revealing they had been controlling LockBit’s infrastructure for some time, collecting information, acquiring victim decryption keys, and even compromising the new ransomware payload intended for LockBit 4.0.
    The research can be found here:
    Ransomware Diaries Volume 5: Unmasking LockBit

    • 30 min
    Cybercriminals target London drugs.

    Cybercriminals target London drugs.

    LockBit drops 300 gigabytes of data from London Drugs. Video software used in courtrooms worldwide contains a backdoor. Google patches another Chrome zero-day. The EU seeks collaboration between research universities and intelligence agencies. Atlas Lion targets retailers with gift card scams. Researchers explore an Apple reappearing photo bug. Hackers access a Japanese solar power grid. Congress floats a bill to enhance cyber workforce diversity. Ben Yelin joins us with a groundbreaking legal case involving AI generated CSAM. Whistling past the expired domain graveyard. 
    Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
    Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

    CyberWire Guest
    Ben Yelin, co host of our Caveat podcast and Program Director for Public Policy & External Affairs at the University of Maryland Center for Health and Homeland Security, discusses "FBI Arrests Man For Generating AI Child Sexual Abuse Imagery."

    Selected Reading
    Hackers release corporate data stolen from London Drugs, company says (The Star)
    Crooks plant backdoor in software used by courtrooms around the world (Ars Technica)
    Google fixes eighth actively exploited Chrome zero-day this year (Bleeping Computer)
    EU wants universities to work with intelligence agencies to protect their research (The Record)
    US retailers under attack by gift card-thieving cyber gang (Help Net Security)
    Apple wasn’t storing deleted iOS photos in iCloud after all (Bleeping Computer)
    Hijack of monitoring devices highlights cyber threat to solar power infrastructure (CSO Online)
    New Diverse Cybersecurity Workforce bill to promote inclusivity, provide CISA with millions for outreach (Industrial Cyber)
    When privacy expires: how I got access to tons of sensitive citizen data after buying cheap domains (INTI)

    Share your feedback.
    We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

    Want to hear your company in the show?
    You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
    The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.

    • 29 min

Top Podcasts In News

开腔
花总的小宇宙
Political Thinking with Nick Robinson
BBC Radio 4
Global News Podcast
BBC World Service
Pacific Waves
RNZ
tagesthemen
tagesschau
The Key of David (Audio)
Gerald Flurry

You Might Also Like

Cyber Security Headlines
CISO Series
Hacking Humans
N2K Networks
Cybersecurity Today
ITWC
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)
Johannes B. Ullrich
Smashing Security
Graham Cluley & Carole Theriault
CISO Series Podcast
David Spark, Mike Johnson, and Andy Ellis