PodcastsNewsCyberWire Daily

CyberWire Daily

N2K Networks
CyberWire Daily
Latest episode

3647 episodes

  • CyberWire Daily

    France builds its own digital future.

    2026-04-14 | 38 mins.
    France pushes digital sovereignty. Adobe rushes an Acrobat Reader patch. Booking.com confirms a targeted breach. SAP fixes a critical SQL injection bug. A sanctions-dodging fraud network resurfaces. ViperTunnel infiltrates U.S. and U.K. firms. GlassWorm spreads across developer tools. Researchers dissect Predator spyware’s kernel engine. A lawsuit challenges AI transcription in hospitals. Ted Shorter from Keyfactor unpacks quantum computing at scale. On our Threat Vector segment, David Moulton and ⁠Elad Koren⁠ pull back the curtain on agentic-first security. Preparing for post-quantum perils. 

    Remember to leave us a 5-star rating and review in your favorite podcast app.

    Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

    CyberWire Guest

    Today we are joined by Ted Shorter, CTO and Co-Founder of Keyfactor, discussing the advent of quantum computing at scale, known as "Q-Day".

    Threat Vector

    Host David Moulton speaks with returning guest ⁠Elad Koren⁠, Vice President of Product Management for Cortex Cloud at ⁠Palo Alto Networks⁠ on this Threat Vector segment. Together they pull back the curtain on what an agentic-first security experience actually looks like in practice. This isn't a vision deck. The agents are already running. To listen to the full conversation, check it out here. Catch new episodes of Threat Vector every Thursday on your favorite podcast app.

    Selected Reading

    France Tees Up Big Public Sector Move Away From US Tech (BankInfo Security)

    Adobe rolls out emergency fix for Acrobat, Reader zero-day flaw (Bleeping Computer)

    Booking.com Confirms Data Breach as Hackers Access Customer Details (Hackread)

    SAP Patches Critical ABAP Vulnerability (SecurityWeek)

    Triad Nexus Evades Sanctions to Fuel Cybercrime (SecurityWeek)

    Ransomware-Linked ViperTunnel Malware Hits UK and US Businesses (Hackread)

    GlassWorm evolves with Zig dropper to infect multiple developer tools (Security Affairs)

    Predator Spyware's iOS Kernel Exploitation Engine: PAC Bypass, NEON R/W & More (Jamf Threat Labs)

    Lawsuit: AI Illegally Recorded Doctor-Patient Encounters (BankInfo Security)

    World Quantum Day (WorldQuantimDay)

    Share your feedback.

    What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

    Want to hear your company in the show?

    N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

    The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
    Learn more about your ad choices. Visit megaphone.fm/adchoices
  • CyberWire Daily

    W3LL runs dry.

    2026-04-13 | 29 mins.
    The FBI disrupts a multi-million-dollar phishing ring. A North Korea-linked supply chain attack hits OpenAI. Developers face a Slack phishing campaign. A critical Python notebook flaw is exploited in hours. ShinyHunters target Rockstar Games. A Japanese shipping firm reports a breach. Tracking the cybersecurity winners and losers in Trump’s 2027 budget, plus a claimed cyberattack on UAE infrastructure. Business breakdown. Our guest is Justin Kohler, Chief Product Officer at SpecterOps, discussing Identity Attack Path Management. Crackdowns at home push scam networks abroad. 

    Remember to leave us a 5-star rating and review in your favorite podcast app.

    Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

    CyberWire Guest

    On today’s Industry Voices, we are joined by Justin Kohler, Chief Product Officer at SpecterOps, discussing Identity Attack Path Management. If you enjoyed this conversation, tune into the full interview here.

    Selected Reading

    FBI Dismantles $20m Phishing Operation W3LL (Infosecurity Magazine)

    The cyber winners and losers in Trump’s 2027 budget (CSO Online)

    Handala carries out unprecedented cyberattack against critical UAE Infrastructure (PressTV)

    OpenSSF Flags Malware Campaign on Slack Posing as Linux Foundation Figures (HackRead)

    OpenAI Impacted by North Korea-Linked Axios Supply Chain Hack (SecurityWeek)

    Critical Marimo pre-auth RCE flaw now under active exploitation (Bleeping Computer)

    GTA-maker Rockstar Games hacked again but downplays impact (BBC)

    NYK alerts on data breach in bunker fuel procurement system (Manifold Times)

    Business Briefing for 04.08.26 (The CyberWire) 

    China Is Cracking Down on Scams. Just Not the Ones Hitting Americans (WIRED)

    Share your feedback.

    What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

    Want to hear your company in the show?

    N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

    The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
    Learn more about your ad choices. Visit megaphone.fm/adchoices
  • CyberWire Daily

    Mark Logan: March towards your goals. [CEO] [Career Notes]

    2026-04-12 | 1 mins.
    Please enjoy this encore of Career Notes.

    Mark Logan, CEO of One Identity, sits down to share his story, explaining how he fit into different roles growing up in different companies. Mark has nearly two decades of C-Suite experience at an array of different organizations, finally landing on his current position as the CEO at One Identity. Sharing his different roles, he also gives a quote from Steve Jobs, saying "it's not what I say yes to, it's what I say no to." He believes that's a key area for his workers because when he is able to make up his mind, his team and his customers have someone they can rely on. Mark says that as a CEO he wants to share the advice of always marching towards your goals, and identifying that different people have different goals because they work in different fields, but that's what makes a company work best. He says "I've found that the more you can delegate, provided you've got the right folks in place the better." We thank Mark for sharing his story.
    Learn more about your ad choices. Visit megaphone.fm/adchoices
  • CyberWire Daily

    Walking through the anatomy of a cyberattack. [CyberWire-X]

    2026-04-12 | 1 mins.
    What does a modern cyberattack really look like from the inside? In this CyberWire-X episode, Dave Bittner speaks with John Anthony Smith, Founder and Chief Security Officer of Fenix24. This conversation takes us step by step as an attacker breaks into a target environment – probing for weaknesses, exploiting entry points, escalating privileges, and moving laterally until they reach their objective. While the attack unfolds, listeners are privy to a behind-the-scenes commentary that reveals the tradecraft: the scripts, misconfigurations, overlooked alerts, and the moments defenders could have stopped the intrusion and, most importantly, prepared for the day through a defense that locks down data and enables a quick and full recovery. This is not a theoretical review or a highlight reel. It's a candid, technical, and eye-opening journey through the full kill chain that will reshape listeners think about detection, incident readiness, and resilience.
    Learn more about your ad choices. Visit megaphone.fm/adchoices
  • CyberWire Daily

    A wolf in admin clothing. [Research Saturday]

    2026-04-11 | 2 mins.
    Today we are joined by Selena Larson, Threat Researcher from Proofpoint research team and co-host of Only Malware in the Building, talking about their work on "(Don't) TrustConnect: It's a RAT in an RMM hat." Proofpoint uncovered TrustConnect, a malware-as-a-service platform posing as a legitimate remote monitoring and management (RMM) tool, but actually functioning as a remote access trojan (RAT) sold to cybercriminals for $300/month.

    The operation used a fake business website, legitimate-looking certificates, and branded installers (like fake Microsoft Teams or Zoom apps) to trick victims, while providing attackers with full remote control, file transfer, and surveillance capabilities. Although parts of its infrastructure were disrupted, the threat actor quickly rebounded with new variants, highlighting both the resilience of the operation and its deep ties to the broader cybercriminal ecosystem abusing RMM tools.

    The research and executive brief can be found here:

    (Don't) TrustConnect: It's a RAT in an RMM hat

    Learn more about your ad choices. Visit megaphone.fm/adchoices

More News podcasts

About CyberWire Daily

The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
Podcast website

Listen to CyberWire Daily, The MeidasTouch Podcast and many other podcasts from around the world with the radio.net app

Get the free radio.net app

  • Stations and podcasts to bookmark
  • Stream via Wi-Fi or Bluetooth
  • Supports Carplay & Android Auto
  • Many other app features

CyberWire Daily: Podcasts in Family