2,000 episodes

The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.

CyberWire Daily N2K Networks

    • News
    • 4.8 • 940 Ratings

The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.

    Memorial Day special.

    Memorial Day special.

    Rick Howard, N2K CyberWire’s Chief Analyst, CSO, and Senior Fellow, commemorates Memorial Day.
    References:
    Abraham Lincoln, 1863. The Gettysburg Address [Speech]. Abraham Lincoln Online.
    Amanda Onion, Original 2009, Updated 2023. Memorial Day 2022: Facts, Meaning & Traditions [Essay]. HISTORY.
    Brent Hugh, 2021. A Brief History of “John Brown’s Body” [Essay]. Digital History.
    Bob Zeller, 2022. How Many Died in the American Civil War? [Essay]. HISTORY.
    General George Marshall, 2014. President Lincoln’s Letter to Mrs Bixby [Movie Clip - Saving Private Ryan]. YouTube.
    JOHN LOGAN, 1868. Logan’s Order Mandating Memorial Day [Order]. John A. Logan College.
    John Williams, Chicago Symphony Orchestra, 2012. The People’s House: Lincoln (Original Motion Picture Soundtrack) [Song]. Apple Music.
    John Williams, Chicago Symphony Orchestra, 2012. The Blue and the Grey: Lincoln (Original Motion Picture Soundtrack) [Song]. Apple Music - Web Playe.
    Livia Albeck-Ripka, 2023. A Brief History of Memorial Day [Essay]. The New York Times.
    Paul Robeson, 2021. John Brown’s Body [Song]. YouTube.
    Robert Rodat (Writer), Steven Spielberg (Director), Harve Presnell (Actor), 1998. Saving Private Ryan [Movie]. IMDb.
    Staff, 2020. A Brief Biography of General John A. Logan [Biography]. John A. Logan College.
    Staff, 2024. Civil War Timeline [WWW Document], American Battlefield Trust.
    Thomas Jefferson, 1776. Declaration of Independence: [Transcription]. National Archives.
    Winston Churchil, 1940. Never was so much owed by so many to so few - Winston Churchill Speeches [Speech]. YouTube.

    • 19 min
    Encore: Richard Torres: Getting that level of experience is going to be crucial. [Security Operations] [Career Notes]

    Encore: Richard Torres: Getting that level of experience is going to be crucial. [Security Operations] [Career Notes]

    Director of security operations at Syntax Richard Torres talks about his path leading him working in juvenile justice to becoming a private investigator to physical security at a nuclear power plant to cybersecurity presently. Always a fan of police shows, Richard became a member of the Air Force Junior ROTC in high school and began his path there. Richard shares the challenges of working in several facets of the security industry including his transition from SWAT team member to cybersecurity. He notes the role that diplomacy plays when you're trying to get honesty and be steered in the right direction. Our thanks to Richard for sharing his story with us. 

    • 8 min
    International effort dismantles LockBit. [Research Saturday]

    International effort dismantles LockBit. [Research Saturday]

    Jon DiMaggio, a Chief Security Strategist at Analyst1, is sharing his work on "Ransomware Diaries Volume 5: Unmasking LockBit." On February 19, 2024, the National Crime Agency (NCA), a UK sovereign law enforcement agency, in collaboration with the FBI, Europol, and nine other countries under "Operation Cronos," disrupted the LockBit ransomware gang’s data leak site used for shaming, extorting, and leaking victim data.
    The NCA greeted visitors to LockBit’s dark web leak site with a seizure banner, revealing they had been controlling LockBit’s infrastructure for some time, collecting information, acquiring victim decryption keys, and even compromising the new ransomware payload intended for LockBit 4.0.
    The research can be found here:
    Ransomware Diaries Volume 5: Unmasking LockBit

    • 30 min
    Cybercriminals target London drugs.

    Cybercriminals target London drugs.

    LockBit drops 300 gigabytes of data from London Drugs. Video software used in courtrooms worldwide contains a backdoor. Google patches another Chrome zero-day. The EU seeks collaboration between research universities and intelligence agencies. Atlas Lion targets retailers with gift card scams. Researchers explore an Apple reappearing photo bug. Hackers access a Japanese solar power grid. Congress floats a bill to enhance cyber workforce diversity. Ben Yelin joins us with a groundbreaking legal case involving AI generated CSAM. Whistling past the expired domain graveyard. 
    Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
    Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

    CyberWire Guest
    Ben Yelin, co host of our Caveat podcast and Program Director for Public Policy & External Affairs at the University of Maryland Center for Health and Homeland Security, discusses "FBI Arrests Man For Generating AI Child Sexual Abuse Imagery."

    Selected Reading
    Hackers release corporate data stolen from London Drugs, company says (The Star)
    Crooks plant backdoor in software used by courtrooms around the world (Ars Technica)
    Google fixes eighth actively exploited Chrome zero-day this year (Bleeping Computer)
    EU wants universities to work with intelligence agencies to protect their research (The Record)
    US retailers under attack by gift card-thieving cyber gang (Help Net Security)
    Apple wasn’t storing deleted iOS photos in iCloud after all (Bleeping Computer)
    Hijack of monitoring devices highlights cyber threat to solar power infrastructure (CSO Online)
    New Diverse Cybersecurity Workforce bill to promote inclusivity, provide CISA with millions for outreach (Industrial Cyber)
    When privacy expires: how I got access to tons of sensitive citizen data after buying cheap domains (INTI)

    Share your feedback.
    We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

    Want to hear your company in the show?
    You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
    The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.

    • 29 min
    Checkmate at check in.

    Checkmate at check in.

    Spyware is discovered on U.S. hotel check in systems. A Microsoft outage affects multiple services. Bitdefender uncovers Unfading Sea Haze. University of Maryland researchers find flaws in Apple’s Wi-Fi positioning system. Scotland’s NRS reveals a sensitive data leak. Rapid7 tracks the rise in zero-day exploits and mass compromise events. The SEC hits the operator of the New York Stock Exchange with a ten million dollar fine. Operation Diplomatic Specter targets political entities in the Middle East, Africa, and Asia. The FCC considers AI disclosure rules for political ads. N2K T-Minus Space Daily podcast host Maria Varmazis speaks with guests Brianna Bace and Unal Tatar PhD sharing their work on Legal Perspectives on Cyberattacks Targeting Space Systems. Tone-blasting underwater data centers. 
    Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
    Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

    CyberWire Guest
    N2K T-Minus Space Daily podcast host Maria Varmazis speaks with guests Brianna Bace and Unal Tatar PhD sharing their work on their paper: Law in Orbit: International Legal Perspectives on Cyberattacks Targeting Space Systems. You can learn more about their work in this post. Check out T-Minus Space Daily for your daily space intelligence. 

    Selected Reading
    Spyware found on US hotel check-in computers ( TechCrunch)
    Microsoft outage affects Bing, Copilot, DuckDuckGo and ChatGPT internet search (Bleeping Computer)
    Deep Dive Into Unfading Sea Haze: A New Threat Actor in the South China Sea (Bitdefender)
     Apple’s Wi-Fi Positioning Can Be System Abused To Track Users (GB Hackers) 
    National Records of Scotland Data Breached in NHS Cyber-Attack (Infosecurity Magazine)
    Zero-Day Attacks and Supply Chain Compromises Surge, MFA Remains Underutilized: Rapid7 Report (SecurityWeek)
    NYSE Operator Intercontinental Exchange Gets $10M SEC Fine Over 2021 Hack (SecurityWeek)
    Operation Diplomatic Specter: An Active Chinese Cyberespionage Campaign Leverages Rare Tool Set to Target Governmental Entities in the Middle East, Africa and Asia (Palo Alto Networks Unit 42 Intel)
    FCC chair proposes requirement for political ads to disclose when AI content is used (The Record)
    Acoustic attacks could be a serious threat to the future of underwater data centers (TechSpot)

    Share your feedback.
    We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

    Want to hear your company in the show?
    You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
    The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.

    • 39 min
    Privacy nightmare or useful tool?

    Privacy nightmare or useful tool?

    Some say Microsoft’s Recall should be. A breach of a Texas healthcare provided affects over four hundred thousand. Police in the Philippines shut down services following a breach. Ivanti patches multiple products. GitHub fixes a critical authentication bypass vulnerability. Researchers discover critical vulnerabilities in Honeywell’s ControlEdge Unit Operations Controller. The DoD releases their Cybersecurity Reciprocity Playbook. Hackers leak a database with millions of Americans’ criminal records. Mastercard speeds fraud detection with AI. On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey, diving into Domain 5: Identity and Access Management. Remembering a computing visionary. 
    Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
    Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

    Learning Layer
    On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey using N2K’s comprehensive CISSP training course, CISSP practice test, and CISSP practice labs. Joe and Sam dive into Domain 5: Identity and Access Management (IAM) and tackle a question together about biometric configuration. Try the question yourself before listening to the discussion!
    You are configuring a biometric hand scanner to secure your data center. Which of the following practices is BEST to follow?

    Decrease the reader sensitivity

    Increase the FAR

    Decrease the FRR

    Increase the reader sensitivity


    Selected Reading
    UK watchdog looking into Microsoft AI taking screenshots (BBC)
    How the new Microsoft Recall feature fundamentally undermines Windows security (DoublePulsar)
    CentroMed Confirms Data Breach Affecting an Estimated 400k | Console and Associates, P.C. (JDSupra)
    PNP suspends online services amid data breach probe (Philippine News Agency)
    Ivanti Patches Critical Code Execution Vulnerabilities in Endpoint Manager (SecurityWeek)
    Critical SAML Auth Bypass Vulnerability Found in GitHub Enterprise Server (Heimdal Security)
    Critical Vulnerability in Honeywell Virtual Controller Allows Remote Code Execution (SecurityWeek)
    DoD CIO debuts cybersecurity reciprocity playbook to streamline system authorizations, boost cybersecurity efficiency (Industrial Cyber)
    Criminal record database of millions of Americans dumped online (Malwarebytes)
    Mastercard Doubles Speed of Fraud Detection with Generative AI (Infosecurity Magazine)
    Gordon Bell, Legendary Designer of Computers, Dies at 89 (Gizmodo) 

    Share your feedback.
    We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

    Want to hear your company in the show?
    You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
    The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.

    • 31 min

Customer Reviews

4.8 out of 5
940 Ratings

940 Ratings

Steve Kingah ,

Exquisite

Cyberwire is simply the best in this space. Rich and to the point.

Damien Lewke ,

I love this show, it’s my non negotiable

I’ve been listening to the Cyberwire for over seven years. As a happy Cyberwire Pro (yes I forked over the $$ for the premium version) customer I must say this show is the only non negotiable daily podcast I listen to. I GENUINELY cannot recommend this show to anyone who’s new to or highly experienced in cyber. I used this to bring myself up to speed when I was new in industry and a decade in, I still find value in it every day!! Five stars

[REDACTED] USER ,

You just subscribed to all of their podcasts with ads about their content…

UPDATE: You just subscribed to all of their podcasts… 5-10 mins of actual content with 15-20 mins of ads including inserting their other podcasts in the Cyberwire Daily podcast. I don't recommend this podcast to anyone who values their time. There is plenty of other shows that give you the content you want. Too much hassle. Weird how things are managed at this place. Including changing names. I suspect they pay their marketing team more than content team.

PREVIOUS UPDATE: I now can listen again! Great podcast! It now plays using VPNs with anti malware/anti tracking VPNs. I would really like to listen again without disabling antimalware/antitracking VPNs. Please change your publishing settings to allow. PREVIOUS UPDATE: Podcast doesn’t play when connected to VPN that uses anti malware technology. Weird why that is an issue with this podcast a few others… Will you please fix this? Most non-cyberwire podcasts play without any issues. I suspect it’s a setting within how you publish your content. Podcast does play with VPN with anti malware tech turned off. Previous PREVIOUS UPDATE: I’m enjoying the podcast again and getting news about cybersecurity. Previously Previous PREVIOUS REVIEW: STOP reporting on non cybersecurity news. Cyberwire not Newswire! If I wanted to listen to news unrelated to cybersecurity, I’d listen to mainstream media… Stick to what people tune into for. Maybe cut show length if you’re having to make up nonsense to fill the show. Otherwise, A good daily 30 min podcast about cybers Good podcast content. Some interviews are great.

Top Podcasts In News

The Daily
The New York Times
The Tucker Carlson Show
Tucker Carlson Network
Up First
NPR
Serial
Serial Productions & The New York Times
Pod Save America
Crooked Media
The Megyn Kelly Show
SiriusXM

You Might Also Like

Cyber Security Headlines
CISO Series
Hacking Humans
N2K Networks
Cybersecurity Today
ITWC
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)
Johannes B. Ullrich
Smashing Security
Graham Cluley & Carole Theriault
Malicious Life
Malicious Life