2,000 episodes

The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.

CyberWire Daily N2K Networks

    • News
    • 4.8 • 930 Ratings

The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.

    Jennifer Walsmith: Pioneering and defining possible. [Cyber Solutions] [Career Notes]

    Jennifer Walsmith: Pioneering and defining possible. [Cyber Solutions] [Career Notes]

    Vice President for Cyber and Information Solutions within Mission Systems at Northrop Grumman, Jennifer Walsmith takes us on her pioneering career journey. Following in her father's footsteps at the National Security Agency, Jennifer began her career out of high school in computer systems analysis. Jennifer notes she saw the value of a college degree and at her parents' urging attended night school. She completed her bachelors in computer science at University of Maryland, Baltimore County with the support of the NSA. Jennifer talks about the support of her team at NSA where she was one of the first women to have a career and a family, raising two children while working. Upon retirement from government service, Jennifer chose an organization with values that closely matched her own and uses her position to help her team define possible where they sometimes think they can't. We thank Jennifer for sharing her story with us.

    • 9 min
    If there's something strange in your neighborhood, don't call Facebook.

    If there's something strange in your neighborhood, don't call Facebook.

    Facebook's Secret Mission to Unmask Snapchat. The White House wants AI audits. Hackers exploit the open-source Ray AI framework. Finnish Police ID those responsible for the 2021 parliament breach. Operation FlightNight targets Indian government and energy sectors. Chinese APT groups target ASEAN entities. A notorious robocaller is rung up for nearly ten million dollars. In our latest Learning Layer, join Sam Meisenberg as he unpacks the intricacies of the CISSP diagnostic with Joe Carrigan from Johns Hopkins University. And Ann Johnson from Microsoft's Afternoon Cyber Tea visits the world of Smashing Security with Graham Cluley and Carole Theriault . And the UK’s watchers need watching.
    Remember to leave us a 5-star rating and review in your favorite podcast app.
    Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

    CyberWire Guests
    Join us for part three as this Learning Layer special series continues. Learning Layer host Sam Meisenberg talks with Joe Carrigan from Johns Hopkins University Information Security Institute, and co-host of Hacking Humans podcast. In this segment, they continue to discuss the results of Joe's CISSP diagnostic and dive deep into one of the assessment questions. Learn more about ISC2’s Certified Information Systems Security Professional (CISSP) certification, and explore our online certification courses, practice tests, and labs that ensure that you’re ready for exam day.
    Microsoft Security’s Ann Johnson, host of the Afternoon Cyber Tea podcast, goes inside the Smashing Security podcast with Graham Cluley and Carole Theriault. 
    Selected Reading
    Facebook snooped on users’ Snapchat traffic in secret project, documents reveal (TechCrunch)
    NTIA Pushes for Independent Audits of AI Systems (GovInfo Security)
    Thousands of companies using Ray framework exposed to cyberattacks, researchers say (The Record)
    Finland confirms APT31 hackers behind 2021 parliament breach (BleepingComputer)
    Operation FlightNight: Indian Government Entities and Energy Sector Targeted by Cyber Espionage Campaign (EclecticIQ)
    Chinese Hackers Target ASEAN Entities in Espionage Campaign (Infosecurity Magazine)
    Federal Court Enters $9.9M Penalty and Injunction Against Man Found to Have Caused Thousands of Unlawful Spoofed Robocalls (US Department of Justice)
    UK counter-eavesdropping agency gets slap on the wrist for eavesdropping (The Record) 

    Share your feedback.
    We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

    Want to hear your company in the show?
    You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
    The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.

    • 37 min
    Exposing Muddled Libra's meticulous tactics with Incident Responder Stephanie Regan [Threat Vector]

    Exposing Muddled Libra's meticulous tactics with Incident Responder Stephanie Regan [Threat Vector]

    In honor of Women's History Month, please enjoy this episode of the Palo Alto Networks Unit 42's Threat Vector podcast featuring host David Moulton's discussion with Jacqueline Wudyka about the SEC's Cybersecurity Law.

    In this episode, join host David Moulton as he speaks with Stephanie Regan, a senior consultant at Unit 42. Stephanie, with a background in law enforcement, specializes in compromise assessment and incident response. Discover her insights into combating the Muddled Libra threat group and similar adversaries.
    Stephanie highlights the crucial role of reconnaissance in investigations and the importance of strong multi-factor authentication (MFA) to counter phishing and social engineering attacks. She delves into techniques like domain typo squatting and shares how domain monitoring can thwart attackers.
    Learn how Unit 42 assists clients in recovering from attacks, especially those by Muddled Libra. Stephanie emphasizes rapid response and coordination, including using out-of-band communications to outmaneuver threat actors.

    You can learn more about Muddled Libra at
    https://unit42.paloaltonetworks.com/muddled-libra/ where Kristopher was the lead author for the Threat Group Assessment: Muddled Libra.

    Join the conversation on our social media channels:
    Website: ⁠https://www.paloaltonetworks.com/unit42⁠
    Threat Research: ⁠https://unit42.paloaltonetworks.com/⁠
    Facebook: ⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠
    LinkedIn: ⁠https://www.linkedin.com/company/unit42/⁠
    YouTube: ⁠@PaloAltoNetworksUnit42⁠
    Twitter: ⁠https://twitter.com/PaloAltoNtwks⁠

    About Threat Vector
    Unit 42 Threat Vector is the compass in the world of cyberthreats. Hear about Unit 42’s unique threat intelligence insights, new threat actor TTPs, real-world case studies, and learn how the team works together to discover these threats. Unit 42 will equip listeners with the knowledge and insight to proactively prepare and stay ahead in the ever-evolving threat landscape.

    PALO ALTO NETWORKS
    Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. ⁠http://paloaltonetworks.com⁠

    • 7 min
    The great firewall breached: China's covert cyber assault on America exposed.

    The great firewall breached: China's covert cyber assault on America exposed.

    An alleged sinister hacking plot by China. CISA and the FBI issued a 'secure-by-design' alert. Ransomware hits municipalities in Florida and Texas. The EU sets regulations to safeguard the upcoming European Parliament elections. ReversingLabs describe a suspicious NuGet package. Senator Bill Cassidy questions a costly breach at HHS. A data center landlord sues over requests to reveal its customers. On our Industry Voices segment, Jason Kikta, CISO & Senior Vice President of Product at Automox, discusses ways to increase IT efficiency while avoiding tool overload & complexity. And Google's AI Throws Users a Malicious Bone.
    Remember to leave us a 5-star rating and review in your favorite podcast app.
    Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

    CyberWire Guest
    On our Industry Voices segment, Jason Kikta, CISO & Senior Vice President of Product at Automox, discusses ways to increase IT efficiency including automation & tool streamlining, IT automation/automated patching, and tool overload & complexity. You can learn more in Automox’s 2024 State of IT Operations Research Report.

    Selected Reading
    Millions of Americans caught up in Chinese hacking plot (BBC)
    US Government Urges Software Makers to Eliminate SQL Injection Vulnerabilities (SecurityWeek)
    CISA adds FortiClient EMS, Ivanti EPM CSA, Nice Linear eMerge E3-Series bugs to its Known Exploited Vulnerabilities catalog (Security Affairs)
    St. Cloud most recent in string of Florida cities hit with ransomware (The Record)
    Hackers demand $700K in ransomware attack on Tarrant Appraisal District (MSN)
    The impact of compromised backups on ransomware outcomes (Sophos News)
    EU sets rules for Big Tech to tackle interference in European Parliament elections (The Record)
    Suspicious NuGet package grabs data from industrial systems (ReversingLabs)
    Senator demands answers from HHS about $7.5 million cyber theft in 2023 (The Record)
    Data center landlord refuses Fairfax County demand for tenant information (Washington Business Journal)
    Google's AI-powered search feature recommends malicious sites, including scams and malware (TechSpot)

    Share your feedback.
    We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

    Want to hear your company in the show?
    You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
    The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.

    • 34 min
    Dr. Rois Ni Thuama: Get into the game. [Cyber governance] [Career Notes]

    Dr. Rois Ni Thuama: Get into the game. [Cyber governance] [Career Notes]

    Head of Cyber Governance with Red Sift, Dr. Rois Ni Thuama shares the circuitous route of her career into cyber governance. She notes the route "looks really clean, but actually it was a bit more Jeremy Bearimy." While at Trinity College, Rois was moved to be part of history unfolding in South Africa and pause her studies. While there, she began making music videos and wildlife documentaries. Upon her return to London, Rois started working in corporate governance and risk at a music technology startup. This ignited her enthusiasm for startups. She now works in a company with several coworkers from that tech startup doing cyber governance. Rois advises law students of many ways into the industry including doing coding, learning risk management, and understanding privacy legislation, and then "just get into the game." We thank Rois for sharing her story. 

    • 9 min
    Python developers under attack.

    Python developers under attack.

    A supply chain attack targets python developers. Russia targets German political parties. Romanian and Spanish police dismantle a cyber-fraud gang. Pwn2Own prompts quick patches from Mozilla. President Biden nominates the first assistant secretary of defense for cyber policy at the Pentagon. An influential think tank calls for a dedicated cyber service in the US. Unit42 tracks a StrelaStealer surge. GM reverses its data sharing practice. Our guest is Anna Belak, Director of the Office of Cybersecurity Strategy at Sysdig, who shares trends in cloud-native security. And a Fordham Law School professor suggests AI creators take a page from medical doctors. 
    Remember to leave us a 5-star rating and review in your favorite podcast app.
    Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

    CyberWire Guest
    Guest Anna Belak, Director of the Office of Cybersecurity Strategy at Sysdig, shares trends in cloud-native security. To learn more, you can check out Sysdig’s 2024 Cloud-Native Security and Usage Report. 

    Selected Reading
    Top Python Developers Hacked in Sophisticated Supply Chain Attack (SecurityWeek)
    Russian hackers target German political parties with WineLoader malware (Bleeping Computer)
    Police Bust Multimillion-Dollar Holiday Fraud Gang (Infosecurity Magazine)
    Mozilla Patches Firefox Zero-Days Exploited at Pwn2Own (SecurityWeek)
    Biden nominates first assistant defense secretary for cyber policy (Nextgov/FCW)
    Pentagon, Congress have a ‘limited window’ to properly create a Cyber Force (The Record)
    StrelaStealer targeted over 100 organizations across the EU and US (Security Affairs)
    General Motors Quits Sharing Driving Behavior With Data Brokers (The New York Times)
    AI's Hippocratic Oath by Chinmayi Sharma (SSRN)

    Share your feedback.
    We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

    Want to hear your company in the show?
    You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
    The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.

    • 34 min

Customer Reviews

4.8 out of 5
930 Ratings

930 Ratings

Damien Lewke ,

I love this show, it’s my non negotiable

I’ve been listening to the Cyberwire for over seven years. As a happy Cyberwire Pro (yes I forked over the $$ for the premium version) customer I must say this show is the only non negotiable daily podcast I listen to. I GENUINELY cannot recommend this show to anyone who’s new to or highly experienced in cyber. I used this to bring myself up to speed when I was new in industry and a decade in, I still find value in it every day!! Five stars

[REDACTED] USER ,

You just subscribed to all of their podcasts with ads about their content…

UPDATE: You just subscribed to all of their podcasts… 5-10 mins of actual content with 15-20 mins of ads including inserting their other podcasts in the Cyberwire Daily podcast. I don't recommend this podcast to anyone who values their time. There is plenty of other shows that give you the content you want. Too much hassle. Weird how things are managed at this place. Including changing names. I suspect they pay their marketing team more than content team.

PREVIOUS UPDATE: I now can listen again! Great podcast! It now plays using VPNs with anti malware/anti tracking VPNs. I would really like to listen again without disabling antimalware/antitracking VPNs. Please change your publishing settings to allow. PREVIOUS UPDATE: Podcast doesn’t play when connected to VPN that uses anti malware technology. Weird why that is an issue with this podcast a few others… Will you please fix this? Most non-cyberwire podcasts play without any issues. I suspect it’s a setting within how you publish your content. Podcast does play with VPN with anti malware tech turned off. Previous PREVIOUS UPDATE: I’m enjoying the podcast again and getting news about cybersecurity. Previously Previous PREVIOUS REVIEW: STOP reporting on non cybersecurity news. Cyberwire not Newswire! If I wanted to listen to news unrelated to cybersecurity, I’d listen to mainstream media… Stick to what people tune into for. Maybe cut show length if you’re having to make up nonsense to fill the show. Otherwise, A good daily 30 min podcast about cybers Good podcast content. Some interviews are great.

runningrinke ,

Would you like some news with your ads?

So many ads for a 15-45 minute show

Top Podcasts In News

The Daily
The New York Times
Up First
NPR
The Ben Shapiro Show
The Daily Wire
Pod Save America
Crooked Media
The Megyn Kelly Show
SiriusXM
The Dan Bongino Show
Cumulus Podcast Network | Dan Bongino

You Might Also Like

Cyber Security Headlines
CISO Series
Cybersecurity Today
ITWC
Hacking Humans
N2K Networks
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)
Johannes B. Ullrich
Malicious Life
Malicious Life
Smashing Security
Graham Cluley & Carole Theriault