2,000 episodes

The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.

CyberWire Daily N2K Networks

    • News

The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.

    Renewed surveillance sparks controversy.

    Renewed surveillance sparks controversy.

    Section 702 gets another two years.  MITRE suffers a breach through an Ivanti VPN. CrushFTP urges customers to patch an actively exploited flaw. SafeBreach researchers disclose vulnerabilities in Windows Defender that allow remote file deletion. Ukrainian soldiers see increased attention from data-stealing apps. GitHub’s comments are being exploited to distribute malware. VW confirms legacy Chinese espionage and data breaches. CISA crowns winners of the President’s Cup Cybersecurity Competition. Cecilia Marinier, Director, Innovation and Programs at RSA Conference, and Niloo Razi Howe, Senior Operating Partner at Energy Impact Partners & judge, review the top Innovation Sandbox contest finalists in anticipation of RSAC 2024. Targeting kids online puts perpetrators in the malware crosshairs. 
    Remember to leave us a 5-star rating and review in your favorite podcast app.
    Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

    CyberWire Guest
    We have two guests today. Cecilia Marinier, Director, Innovation and Programs at RSA Conference, and Niloo Razi Howe, Senior Operating Partner at Energy Impact Partners & judge, review the top Innovation Sandbox contest finalists and what to look for on the innovation front at RSAC 2024. For 18 years, cybersecurity's boldest new innovators have competed in the RSAC Innovation Sandbox contest to put the spotlight on their potentially game-changing ideas. This year, 10 finalists will once again have three minutes to make their pitch to a panel of judges. Since the start of the contest, the Top 10 Finalists have collectively seen over 80 acquisitions and $13.5 billion in investments. Innovation Sandbox will take place on Monday, May 6th at 10:50am PT.

    Selected Reading
    Warrantless spying powers extended to 2026 with Biden’s signature (The Record)
    MITRE breached by nation-state threat actor via Ivanti zero-days (Help Net Security)
    CrushFTP File Transfer Vulnerability Lets Attackers Download System Files (Infosecurity Magazine)
    Researchers Claim that Windows Defender Can Be Bypassed (GB Hackers)
    Ukrainian soldiers’ apps increasingly targeted for spying, cyber agency warns  (The Record)
    GitHub comments abused to push malware via Microsoft repo URLs (Bleeping Computer)
    Presumably Chinese industrial spies stole VW data on e-drive technology (Bleeping Computer)
    CISA declares winners of President’s Cup cybersecurity competition, with Artificially Intelligent team leading (Industrial Cyber)
    Malware dev lures child exploiters into honeytrap to extort them (Bleeping Computer)

    Share your feedback.
    We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

    Want to hear your company in the show?
    You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
    The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.

    • 35 min
    Encore: Kiersten Todt: problem solving and building solutions. [Policy] [Career Notes]

    Encore: Kiersten Todt: problem solving and building solutions. [Policy] [Career Notes]

    Managing director of the Cyber Readiness Institute Kiersten Todt shares how she came to be in the cybersecurity industry helping to provide free tools and resources for small businesses through a nonprofit. She describes how her work on the Hill prior to and just after 9/11 changed. Kiersten talks about the diversity of skills that benefit work in cybersecurity and offers her advice on going after what you want to do. Our thanks to Kiersten for sharing her story with us. 

    • 7 min
    Cloud Architect vs Detection Engineer: Mutual benefit. [CyberWire-X]

    Cloud Architect vs Detection Engineer: Mutual benefit. [CyberWire-X]

    In this episode of CyberWire-X, N2K CyberWire’s Podcast host Dave Bittner is joined by Brian Davis, Principal Software Engineer, and Thomas Gardner, Senior Detection Engineer, both from Red Canary. They engage in a cloud architect vs. detection engineer discussion. Through the conversation, they illustrate how one person benefits the other's work and how they work together. Red Canary is our CyberWire-X episode sponsor.

    • 18 min
    The art of information gathering. [Research Saturday]

    The art of information gathering. [Research Saturday]

    Greg Lesnewich, senior threat researcher at Proofpoint, sits down to discuss "From Social Engineering to DMARC Abuse: TA427’s Art of Information Gathering." Since 2023, TA427 has directly solicited foreign policy experts for their opinions on nuclear disarmament, US-ROK policies, and sanction topics via benign conversation starting emails. 
    The research states "While our researchers have consistently observed TA427 rely on social engineering tactics and regularly rotating its email infrastructure, in December 2023 the threat actor began to abuse lax Domain-based Message Authentication, Reporting and Conformance (DMARC) policies to spoof various personas and, in February 2024, began incorporating web beacons for target profiling."
    The research can be found here:
    From Social Engineering to DMARC Abuse: TA427’s Art of Information Gathering

    • 31 min
    Swift responses to cyberattacks.

    Swift responses to cyberattacks.

    Two swift responses to recent cyberattacks. Frontier Communications discloses cyberattack. Texas town repels water system cyberattack by unplugging. List of undesirables falls into the wrong hands. CryptoChameleon phishing kit impersonates LastPass. Ransomware payments trending down in Q1 2024 and a warning for small to medium-sized businesses. US auto manufacturers targeted by FIN7. Akira ransomware has made $42 million since March 2023. No more WhatsApp or Threads in China. Concerning drop in US cybersecurity job listings. Our guest is Zscaler’s Chief Security Officer Deepen Desai exploring encrypted attacks amidst the AI revolution. Meghan Markle hacked by Kate supporters. 
    Remember to leave us a 5-star rating and review in your favorite podcast app.
    Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

    CyberWire Guest
    Guest Deepen Desai, Chief Security Officer and SVP Security Engineering & Research at Zscaler, joins us to talk about exploring encrypted attacks amidst the AI revolution.

    Selected Reading
    Frontier Communications Shuts Down Systems Following Cyberattack (SecurityWeek)
    Tiny Texas City Repels Russia-Tied Hackers Eyeing Water System (Bloomberg) 
    Cybercriminals threaten to leak all 5 million records from stolen database of high-risk individuals (The Register) 
    Advanced Phishing Kit Adds LastPass Branding for Use in Phishing Campaigns (LastPass)
    Ransomware in Q1 2024: Frequency, size of payments trending downwards, SMBs beware! (Help Net Security)
    FIN7 cybercriminals targeted large U.S. automotive manufacturer last year (The Record) 
    Akira Ransomware Made Over $42 Million in One Year: Agencies (SecurityWeek) 
    Apple pulls WhatsApp, Threads from China App Store following state order (TechCrunch)
    Alarming Decline in Cybersecurity Job Postings in the US (Infosecurity Magazine)
    Meghan Markle's new lifestyle website hijacked by anonymous user whose ‘thoughts are with Kate’ (GB News)

    Share your feedback.
    We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

    Want to hear your company in the show?
    You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
    The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.

    • 31 min
    Cyber Talent Insights: Charting your path in cybersecurity. (Part 2 of 3) [Special Edition]

    Cyber Talent Insights: Charting your path in cybersecurity. (Part 2 of 3) [Special Edition]

    Join us for this special three-part series where the N2K Cyber Talent Insights team guides you through effective strategies to develop your cybersecurity team, helping you stay ahead in the constantly changing cybersecurity landscape. 

    In this episode, we shift our point of view to provide guidance for an individual's first career or perhaps considering a career change transitioning into the field. We discuss a market-driven approach to career development. We also explore how to discover one’s niche in cybersecurity, including how to stand out in this competitive market and align personal interests with career goals. Lastly, we examine the role certifications play when navigating your path throughout the talent acquisition, development, and retention of the cybersecurity workforce management lifecycle.  

    Explore Cyber Talent Insights
    N2K’s Cyber Talent Insights provides security leaders measurable and actionable insights on your organization’s current cyber roles and capabilities to maximize your talent investments and build a business case for better hiring, developing, maintaining, and retaining your technical talent pools. Learn how at n2k.com/talent-insights.

    Connect with the N2K Cyber Workforce team on Linkedin:


    Dr. Sasha Vanterpool, Cyber Workforce Consultant 


    Dr. Heather Monthie, Cybersecurity Workforce Consultant


    Jeff Welgan, Chief Learning Officer


    Resources for developing your cybersecurity teams:

    N2K Cyber Workforce Strategy Guide

    Workforce Media Resources

    Cyber Talent Acquisition Woes for Enterprises


    Workforce Intelligence: What it is and why you need it for cyber teams webinar


    Setting Better Cyber Job Expectations to Attract & Retain Talent webinar

    • 52 min

Top Podcasts In News

Alert Tunisie - Lutte contre l’économie de rente | آلارت - لمكافحة المنظومة الريعية
ALERT TUNISIE
LEGEND
Guillaume Pley
Un podcast à soi
ARTE Radio
Serial
Serial Productions & The New York Times
Les actus du jour - Hugo Décrypte
Hugo Décrypte
No One Knows Anything
BuzzFeed

You Might Also Like

Cyber Security Headlines
CISO Series
Hacking Humans
N2K Networks
Cybersecurity Today
ITWC
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)
Johannes B. Ullrich
Malicious Life
Malicious Life
CISO Series Podcast
David Spark, Mike Johnson, and Andy Ellis