2,000 episodes

The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.

CyberWire Daily N2K Networks

    • News

The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.

    Cybercriminals target London drugs.

    Cybercriminals target London drugs.

    LockBit drops 300 gigabytes of data from London Drugs. Video software used in courtrooms worldwide contains a backdoor. Google patches another Chrome zero-day. The EU seeks collaboration between research universities and intelligence agencies. Atlas Lion targets retailers with gift card scams. Researchers explore an Apple reappearing photo bug. Hackers access a Japanese solar power grid. Congress floats a bill to enhance cyber workforce diversity. Ben Yelin joins us with a groundbreaking legal case involving AI generated CSAM. Whistling past the expired domain graveyard. 
    Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
    Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

    CyberWire Guest
    Ben Yelin, co host of our Caveat podcast and Program Director for Public Policy & External Affairs at the University of Maryland Center for Health and Homeland Security, discusses "FBI Arrests Man For Generating AI Child Sexual Abuse Imagery."

    Selected Reading
    Hackers release corporate data stolen from London Drugs, company says (The Star)
    Crooks plant backdoor in software used by courtrooms around the world (Ars Technica)
    Google fixes eighth actively exploited Chrome zero-day this year (Bleeping Computer)
    EU wants universities to work with intelligence agencies to protect their research (The Record)
    US retailers under attack by gift card-thieving cyber gang (Help Net Security)
    Apple wasn’t storing deleted iOS photos in iCloud after all (Bleeping Computer)
    Hijack of monitoring devices highlights cyber threat to solar power infrastructure (CSO Online)
    New Diverse Cybersecurity Workforce bill to promote inclusivity, provide CISA with millions for outreach (Industrial Cyber)
    When privacy expires: how I got access to tons of sensitive citizen data after buying cheap domains (INTI)

    Share your feedback.
    We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

    Want to hear your company in the show?
    You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
    The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.

    • 29 min
    Checkmate at check in.

    Checkmate at check in.

    Spyware is discovered on U.S. hotel check in systems. A Microsoft outage affects multiple services. Bitdefender uncovers Unfading Sea Haze. University of Maryland researchers find flaws in Apple’s Wi-Fi positioning system. Scotland’s NRS reveals a sensitive data leak. Rapid7 tracks the rise in zero-day exploits and mass compromise events. The SEC hits the operator of the New York Stock Exchange with a ten million dollar fine. Operation Diplomatic Specter targets political entities in the Middle East, Africa, and Asia. The FCC considers AI disclosure rules for political ads. N2K T-Minus Space Daily podcast host Maria Varmazis speaks with guests Brianna Bace and Unal Tatar PhD sharing their work on Legal Perspectives on Cyberattacks Targeting Space Systems. Tone-blasting underwater data centers. 
    Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
    Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

    CyberWire Guest
    N2K T-Minus Space Daily podcast host Maria Varmazis speaks with guests Brianna Bace and Unal Tatar PhD sharing their work on their paper: Law in Orbit: International Legal Perspectives on Cyberattacks Targeting Space Systems. You can learn more about their work in this post. Check out T-Minus Space Daily for your daily space intelligence. 

    Selected Reading
    Spyware found on US hotel check-in computers ( TechCrunch)
    Microsoft outage affects Bing, Copilot, DuckDuckGo and ChatGPT internet search (Bleeping Computer)
    Deep Dive Into Unfading Sea Haze: A New Threat Actor in the South China Sea (Bitdefender)
     Apple’s Wi-Fi Positioning Can Be System Abused To Track Users (GB Hackers) 
    National Records of Scotland Data Breached in NHS Cyber-Attack (Infosecurity Magazine)
    Zero-Day Attacks and Supply Chain Compromises Surge, MFA Remains Underutilized: Rapid7 Report (SecurityWeek)
    NYSE Operator Intercontinental Exchange Gets $10M SEC Fine Over 2021 Hack (SecurityWeek)
    Operation Diplomatic Specter: An Active Chinese Cyberespionage Campaign Leverages Rare Tool Set to Target Governmental Entities in the Middle East, Africa and Asia (Palo Alto Networks Unit 42 Intel)
    FCC chair proposes requirement for political ads to disclose when AI content is used (The Record)
    Acoustic attacks could be a serious threat to the future of underwater data centers (TechSpot)

    Share your feedback.
    We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

    Want to hear your company in the show?
    You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
    The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.

    • 39 min
    Privacy nightmare or useful tool?

    Privacy nightmare or useful tool?

    Some say Microsoft’s Recall should be. A breach of a Texas healthcare provided affects over four hundred thousand. Police in the Philippines shut down services following a breach. Ivanti patches multiple products. GitHub fixes a critical authentication bypass vulnerability. Researchers discover critical vulnerabilities in Honeywell’s ControlEdge Unit Operations Controller. The DoD releases their Cybersecurity Reciprocity Playbook. Hackers leak a database with millions of Americans’ criminal records. Mastercard speeds fraud detection with AI. On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey, diving into Domain 5: Identity and Access Management. Remembering a computing visionary. 
    Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
    Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

    Learning Layer
    On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey using N2K’s comprehensive CISSP training course, CISSP practice test, and CISSP practice labs. Joe and Sam dive into Domain 5: Identity and Access Management (IAM) and tackle a question together about biometric configuration. Try the question yourself before listening to the discussion!
    You are configuring a biometric hand scanner to secure your data center. Which of the following practices is BEST to follow?

    Decrease the reader sensitivity

    Increase the FAR

    Decrease the FRR

    Increase the reader sensitivity


    Selected Reading
    UK watchdog looking into Microsoft AI taking screenshots (BBC)
    How the new Microsoft Recall feature fundamentally undermines Windows security (DoublePulsar)
    CentroMed Confirms Data Breach Affecting an Estimated 400k | Console and Associates, P.C. (JDSupra)
    PNP suspends online services amid data breach probe (Philippine News Agency)
    Ivanti Patches Critical Code Execution Vulnerabilities in Endpoint Manager (SecurityWeek)
    Critical SAML Auth Bypass Vulnerability Found in GitHub Enterprise Server (Heimdal Security)
    Critical Vulnerability in Honeywell Virtual Controller Allows Remote Code Execution (SecurityWeek)
    DoD CIO debuts cybersecurity reciprocity playbook to streamline system authorizations, boost cybersecurity efficiency (Industrial Cyber)
    Criminal record database of millions of Americans dumped online (Malwarebytes)
    Mastercard Doubles Speed of Fraud Detection with Generative AI (Infosecurity Magazine)
    Gordon Bell, Legendary Designer of Computers, Dies at 89 (Gizmodo) 

    Share your feedback.
    We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

    Want to hear your company in the show?
    You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
    The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.

    • 31 min
    The secrets of a dark web drug lord.

    The secrets of a dark web drug lord.

    The alleged operator of Incognito Market is collared at JFK. The UK plans new ransomware reporting regulations. Time to update your JavaScript PDF library. CISA adds a healthcare interface engine to its Known Exploited Vulnerabilities (KEV) catalog. HHS launches a fifty million dollar program to help secure hospitals. A Fluent Bit vulnerability impacts major cloud platforms. The EPA issues a cybersecurity alert for drinking water systems. BiBi Wiper grows more aggressive. Siren is a new threat intelligence platform for open source software. On our Industry Voices segment, guest Amit Sinha, CEO of DigiCert, joins N2K’s Rick Howard to discuss “Innovation: balancing the good with the bad.” And is it just me, or does that AI assistant sound awfully familiar?
    Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
    Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

    CyberWire Guest
    On our Industry Voices segment, guest Amit Sinha, CEO of DigiCert, joins N2K’s Rick Howard to discuss “Innovation: balancing the good with the bad.” Rick caught up with Amit at the recent RSA Conference in San Francisco. 

    Selected Reading
    “Incognito Market” Owner Arrested for Operating One of the Largest Illegal Narcotics Marketplaces on the Internet (United States Department of Justice)
    Exclusive: UK to propose mandatory reporting for ransomware attacks and licensing regime for all payments (The Record)
    CVE-2024-4367 in PDF.js Allows JavaScript Execution, Potentially Affecting Millions of Websites: Update Now (SOCRadar)
    CISA Warns of Attacks Exploiting NextGen Healthcare Mirth Connect Flaw (SecurityWeek)
    Fluent Bit flaw discovered that impacts every major cloud provider (Tech Monitor)
    EPA Issues Alert After Finding Critical Vulnerabilities in Drinking Water Systems (SecurityWeek)
    New BiBi Wiper version also destroys the disk partition table (Bleeping Computer)
    Enhancing Open Source Security: Introducing Siren by OpenSSF (OpenSSF)
    HHS offering $50 million for proposals to improve hospital cybersecurity (The Record)
    Scarlett Johansson Said No, but OpenAI’s Virtual Assistant Sounds Just Like Her (The New York Times)

    Share your feedback.
    We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

    Want to hear your company in the show?
    You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
    The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.

    • 39 min
    Double key encryption debate.

    Double key encryption debate.

    Germany’s BSI sues Microsoft for more information on recent security incidents. Julian Assange can appeal his U.S. extradition. AI chatbots may have itchy trigger fingers. CISA warns of vulnerabilities affecting Google Chrome and D-Link routers. Ham Radio’s association suffers a data breach. New underground marketplaces pop up to replace BreachForums. An updated banking trojan targets users in Central and South America. Cybercom’s founders share its origin story.  Examining gender bias in open source software contributors. For our Industry Voices segment, guest Chris Pierson, CEO at BlackCloak, met up with N2K’s Brandon Karpf at the 2024 RSA Conference to discuss personal cybersecurity risks for executives. College students unlock free laundering — no money required. 
    Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
    Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

    CyberWire Guest
    On our Industry Voices segment, guest Chris Pierson, CEO at BlackCloak, met up with N2K’s Brandon Karpf at the 2024 RSA Conference. Chris and Brandon discussed personal cybersecurity risks for executives.

    Selected Reading
    BSI sues Microsoft for disclosure of information on security disaster (Ground News)
    Assange Can Appeal U.S. Extradition, English Court Rules (The New York Times)
    ChatGPT likes to fight. For military AI researchers, that’s a problem (Tech Brew)
    CISA warns of hackers exploiting Chrome, EoL D-Link bugs (Bleeping Computer)
    American Radio Relay League Hit by Cyberattack (SecurityWeek)
    FBI seizes BreachForums infrastructure — but successor sites are already popping up (ITPro)
    Grandoreiro Banking Trojan is Back With Major Updates (Infosecurity Magazine)
    (PDF) Gender bias in open source: Pull request acceptance of women versus men (ResearchGate)
    The inside story of Cyber Command’s creation (CSO Online)
    Two Santa Cruz students uncover security bug that could let millions do their laundry for free (TechCrunch) 

    Share your feedback.
    We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

    Want to hear your company in the show?
    You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
    The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.

    • 45 min
    Encore: Monica Ruiz: Moving ahead when not many look like you. [Policy] [Career Notes]

    Encore: Monica Ruiz: Moving ahead when not many look like you. [Policy] [Career Notes]

    Cyber Initiative and Special Projects Fellow at the Hewlett Foundation Monica Ruiz shares her career development from aspirations of being a weather woman to her current role as a grantmaker and connector in cybersecurity. Monica discusses how her international study experience changed her outlook and brought her to the field of security. She shares the difficulties she faced as a woman of color when when not that many people look like you, and how she used that as her reason to move forward and better the cybersecurity field through her work. Our thanks to Monica for sharing her story with us. 

    • 7 min

Top Podcasts In News

Cognitive Dissonance
Atheist and Skeptical News
The Clement Manyathela Show
Primedia Broadcasting
Rethinking Palestine
Al-Shabaka: The Palestinian Policy Network
Global News Podcast
BBC World Service
Newshour
BBC World Service
Piers Morgan Uncensored
Piers Morgan Uncensored

You Might Also Like

Cyber Security Headlines
CISO Series
Hacking Humans
N2K Networks
Cybersecurity Today
ITWC
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)
Johannes B. Ullrich
Smashing Security
Graham Cluley & Carole Theriault
CISO Series Podcast
David Spark, Mike Johnson, and Andy Ellis